5571f8d918ebf7ed0a3765501b3f12654392ed737a82172ac25cb842ef9dbdffc357362d86f93dc30166897a99b9972817d13b067d4863b97b6ba73a15bac4bb857d2c2f08c65ba530d43cfe6c9da07031fb5ff8ffb1d5f14373ccab13c41225c7c35fcb468c8a791bc59f6d50959814665efae1b24f26b340ca57754a3d32ef596ec2bc7f959df9e2e587a3ca24e876ea7fbc06d5ff6badccf573309bb913b62cf60bc6d9549ebce5a77528c7da06dc227155ea20fb464413d7b44d3ba0ea74231e1b5318891bfcdfd8ebd98cf07bd168c50c6ad74242702ef0c25d4ed4a3b40198929e00c208cbef294c5c7b08aa258149133950137231b77faa7e372ee6e4ff3dddc166f52a6b32ca511106968928067e65be4cc9d863d0c3e7e7a5cde4242854c2753a22d8cb4ecf01943eea66ca2afb70a48a2f0e86e3b2c1a6f293fbe6a61ad180e4dee315e9a6dfc0faf889568adaa284491a444d6e87df1ffefb79fe452479f53bfaaad069aba03e4633d52246f4984a2eb2c43ab0ff5a091ed207c0ba1472ad9a5836a0b01f1ef245b5a08b88fbb301f33e093b4b0450be80db9a17cf72ff729663fd24c0e4ce606bdb96e39d09a4c3776cbeab74150c3750945839dfbbc8ea3a49d290ecf6f47e0f11c48fa2c0837e62a586b96a7d555316b42977bf876e5134af592e78e2c8c630d4155d2f331bfcf5cd485ae7c8b14aacba3a93cb008f1bd8b647c9f4a1fb4560a2d2deecf25092a9cf73f14cdcbe01135facba9e5a54a54ce669e89b4b45c50423c648a84680b2d98b11b442d477116638fa2f0327ceffb5ec78e5f5a43a2382eef147d31fe5e3d4d32e851893c5a5c83a06eed883b3cb6030f75e84d3e7ea4f1150bd812297e47753157d2d21ee8fdbf433a8898d122f335c75c5913a79e3b2a60a1fa1e51aefe60e01a21c575934bd1a7125f8a52acbd84ed34a1f77f2bd5c314bdc031f6bff347c5540a88d8fd2247df15eb6ecc4eb4ff1d5ca6103726cdce8b8ce98ca9d7b39610d236b447c3eab32012dee657d0313f09f699ee2112f780f2b03e76b8e4450a04d1613ec23647f548a42532af9e541947a2df25cf17914a3866d0520eaa0071efa6b91b8ef36e65b2705ed0845791bc5cc43ca28b63af19f21058faac53bf78f6688e96d989499b7d7d7e14ae48174d24700dd9f20e22a105e7b6826512f03381e3055a012614269d3e085b0e14ce90f4e615f79b4dc3c41620d5d3e41f0854894d8127cbb8da8233589125397d217402e543c3ec62d7a42ce6e93fa219c4e31d3597852d16c87ae9ca02a73660fced913fb58fc28442d36710c00ab3963d61c9c41c1ee87f1a8d62f90f07d14a7e9df4cceec48cbd61609a048435f26e3ae143c86c9bb0c813ed4b972e30b6837c37001bd327a36c1f44bbd8a19a17770311d3bea6defa0a1fb0216ea76e6ee24a84dd50e0ae24c9f300648174c07fe7142003fee430e94421d7ced5618ce1b14f9d9afe7629626fe58badac9c66076b81ea27f26b11f7bdcff1b06d09cedfc09db50bddf7bb233c968af14f70afd37da5ecd3d2ec98ed9cdac64a4297bf73229d55af212d250e583142548b0e2e6538b0c5cf08b3e0d7ad82be8fc0067a1e38ee6ef2130136831cfa17e7bedcf9306715d38f47138b3403c566461d18652f9e788c717d90db276644b88f66fb010674ae2ed6e3c9f2e91e08e2425498fb4769994dd6b1125a9c8d7130993b0b398618bfb0f4c79f0dad897da59a229c5657e6a3023d9cdb133aecf2748f45b580dfb5e35d5222e148baee3ec6571b63f346d4fcf14575b5260ad0ce346ee2a09e2d622910d8e7d8b9ab4711d3164ff0400e33e7317caa0f1c56b613ac63b8620b6395476070d0b2bded4d22069d8c93f33739aa8be0c0e18d23ee3dc1a1efe4c1b325caa1866d1cb9f26b32de2f1682204d2897ec8eb3f8bcb07fe7122c1a94a66974938dfc693cbc197dbee3b2b25b9285f7f40d890baa3f4487c674cfe8bab3ceddb1e5d681aadabfcdb8789565d28b4248b539439d20059a56a4ca4efd9f7d7720d1fa6f77d792023c8ce1f798c20915d404a214ebdb643fade21e0217287d1b4fbd239a57d8dd127710a5882a6045b6a88dc296388a8b70842daa8b84623f701cc9c138d52209290367dc3e91ecece0dba3749c08b1a3ccfdc2a5d71725168a8435c5b662939ea6255d302d7eea71e8ac001eddc7ac64760da8abd79a84e2ae49142afae945c0e56aa35e4392e9198ee0cc487c43f8552a0c91dede3f26ab6b3a4a7e49879fdb98439f5f30495d52a4fdaaa7f2671b4082e56c9660a3d6010862489beb73e4e101d156b6e88ea77557b9122e8b72929f2cfe086b904e1963fe07e11cfff51da2fc137976e2d8b69a736b92bcc2cd3dcd175558a9c70614a609e734880c30350da2741cef0de6bc13a01576811b9d9ce6eb337ee06d05c62742c699d4abc8cbb312c16b72de099246b509beb0379c8e5cfa0d8ff763652491adcb7b1d09a9c3be8f35eb74c7a3e991dde8a83a3ec8b04a6f6ebbf6433a92f2618f0a795866fa9bc1d5df04f96f126d8023d10c77c8bc302c1755f66b39b7708aa85cf5e57cd559eef4b243ce73f1dbc9524b52c7d6fc80acd8de32a4f912c8cf713e1f6b5d8cb34468d3e8f942326c80672b90f3ffada9ab66770d41d1e78bb4cd0d838fcb20c78894b882e550e3e535f094c545fa8f3a97147eba6e4b990a0b9f1982fe3d3080ec4e04a5f72442509da893c1dde08241913ad41b65c69969bf3d0c1929df872f38493487c04a2662cea0d3c33b04ece68c89874909a18c268733a272ea585ab564a9163193c9984c1e37d322df56080f3ad8363a5a98bc602466ee9532e1774e29b285255d36f066d96205beba29af5e1533003a71662161b1afe318b2165bb386fc50b28f0544a8c666311f6433cb3a48a4f3e21c21ec2dbc3d466c6450a6cfa83cbcde21cb7f6e18176af22d6f0845de1b9e3ec730b261f792148328e9df268413b41dc490e6f3a472e6da271c0159b0060daa001f59bcf0b52ce1f3869e53cf0997a48c2b42cf37b4ebea4b3c3097d4303f901d6933922f4a1a8eae8bba74a53b73c24c576428ebd7e795c6f7935b8c7e2de3e41ecfad8be827dd497cbc1b8430990564c3183e676ae5ff8045200a15a5e0952a974c2fc4163bbf3620e6edb7e33f70d7b017e4df9a612de57df786b46d15a77fad2d96530053d318fdf80523b44e181211332fccb623b1636faf8ea3815c4d2b71dcf94d0eea11eef03751d232220d212e79c1762731ffb64ffd46e605ddbeb7552d876e603adde830e7ddfcb416d2ecae68a2377bee7d09f2aca0dd38332044455d2c3a9334739cf12e977bca8f65e1b1c1904aa0cd534cd9344f95400af75857834782afeb3f4122b8c32e900a071a128cdae0c2c2a4aab0b7cb6a24ff02de439bcc7894a9d16721961e8b87730d030e45fce57a9ce264ab0c674c846e17bb5f1f339929f753f252aad7c360672726178b4f14b7781addf6266881fc3edad64c4ecd0b74ed74caa10ca89ece27c5e60e7c811f58dc81bac55a7e02369daebb71bb2283f91d606a16fde4d5b8120dcbc2feca3ee7c131b39a3e893ff8cfb4deac7af26cd8d04d91eb9fe7d8d8081c9851d4ab9a21d22616dad6c4db597b2cafad5501f5189a1b57100561effd3771884fa24cbe42831a33f14022b532ef706aa80f8c092610205f8040d653635d915735ac368e3f51ee9d4b4f44cb7b0501cc0312733f2db87f69a78cbb4ce5f29afc9d004aadb4ce4f720c5d01672273262907404918272e26f5507f5f07270321ce5db2b4e4e287d7417066743a2ac53b3db66f3c8ff9fec4cb44d1907b00a233a8a252c4a580041e6ff4ac5bddd00b674680d47b0541986ba17b4af57118a0ca05191c8681f75f38b1fa38e0d9de5e442f1aa1abcb39e78a0c753a00b975f8ea051f99a7fa6b8ee358fd718a62029bf72b9b7089b366c40aad70b6c2bad9fd3477f7ebe15d52d85092b1f5b48db86e33b3e48198c2d6e00946fdc88ea71bc953ddc692359c564580994f96b9ce04a4b71eb5e6f64c12159b172bf663d6044b02819dd8db432cd774900e0fe458afb08802342ffa4579513fded49d2176ed88263045c4889a702d6ecf66ee72c029a4aaef29246faae891b77f5ae959b57ef45fd591a977c406a43718a1f05d983b4847672b89ec47185623c86f07e13fca90a6ecff46badd5c4d4b9d009467d086f7fb8b2be9d47391bf454128b7daece7d8257ad35ab53ec7e6421b5846b51a701b7f0ea1e5941a2bc8c75a4719c4674dec625374168726681c4b3518dc8684288cb449245333d0f1be813602d535ebc929c20fb6ea85402b80a101d4d837bef9b3d480c6c4f6564bc7a2f19e599483b47e54413065a0f19e579bcfa17bcac444c985c499e9152eb9b7b09697346c71e11270791c8025dd0e44c83655b5355ba6b829affc9044b41379685f30f6e8bd60cb49dad7dfc91b179f681ab498797bf21a37d48547b9a1358c857fd4c8dd6ff79b2cfa9175e3b12d02c4a8bf7c9e8ca4ef5f08e41eb29dd52704b8597843c0f5cc9f7c1362172c9907f36f17b3d25d44cc5ca9fe7286e895dcb6f329bbe04dc320f3988b75978941e032519e291efd5f0e012dba1c72dc6deddb939bb84edc1d91eadcc056c976a1020937c0bc53ef2c882a18c3b1a681252de79007a95786275b34569be9f9b3d5102e75e35eb206f6307042e432f0c7d997211d4bca49505fc3b9ed9c4c46eeb683789c2a7f3272e1f9ad6ee3dc31d9d828641009a2353fbd2fcea55d40e480bd9d0fae0821966e0dd93d0be9a6338ba119f139ec18700e59da30219adeee978c640c1a54e483a12b937f2d5b6fa19ffc20e665e2433f944545f7fe66bae310e7b526d5158d96e214aeb9e2e087c2f6c6c819f09e2353a3d7a671fde0c061df7549b812c73dd0f3717ecfd3ab0da7917dd9e5c80d392ac0e56bfca16e870df71504ab1de19c7b0af16e0f1dbdfa1f7f1af9608c3bf7de9cf1bfe393d732e17881a5067d83f850892465f81666ad9ee2cdc5cb793ea2fb1d7fd374295e7d8e03ce71cae8246e7add7e22e76040705c8a721a52562cbd4a9ade1caa439c9970b7ad1cb3796400e4ba6cded25bd3306671b77ddebfb6efe77f5e444c22856a039af5245e7dec8f275dcc7178f3f89011d63f3ed412833d0c5f98d0e9f3f66ee65f0b431ac61124d669c22d5bf6e59135395e2e55ab73e968381f80d5af93fb6140f798ef88e0ac07845eca0a91", 0x1000}, {&(0x7f0000002340)="9cc8974cbd0982ff78f48428d6630665d03a8ffe6fa6d47ef95c01556d8e25747459dea9e808b0fa31beba58a6b27529bf30e6f39a6086b41cda1c3f82e9282842849b8380e5bf0b73a51d69a193a0ab4d81dfa11f08da84838c50c8c8b18acfb69f855d5ff5c7b94556c4e20c787ed937e9c034e32d110040e9db7d729be56524e08464f4a305bc3dfd72ba73d5d8f99e6ba56cf07f4bbaaaa8e04965600e76dda589af4f31b2dd024c56bb93b19ca70874c1b49e7b09de1308895c0fd32beb28c7ddb4662644164eb900c814dcf244e6e66db4b771364303900812cd26e636bff72c6066905a7436", 0xe9}, {&(0x7f0000002440)="f7422c7fecbdd6cb802ba65b4931cdeeb98bc5d539685ba8f82a", 0x1a}, {&(0x7f0000002480)="b32d6f68d1ccfca63ad84655df9ff00d51328f127c979106e92cc8eb8716e3d7d38c22f04c7cbc01d865f8fdcd8b5126c53de7b416541526e0174bd6dda01af962d21aa53ccc380ff8aa70990d7ca120225f004929559672169bd040435b7d5b29fd4ea889126945005897259cc6ba2ac425978e1a200f5711cf88411c57d1e5abe67debf9a9dc7b298ca245911f0fadac0d8f776df5571497cb31a8e85de8ac6a8c7321974187f782ab063248823c0267456d21404f7f74cd403af34177275de77cb2bb8d", 0xc5}, {&(0x7f0000002580)="9a92c5d9d5a1229470a0610985397cb70139c3e074bcd0221f3b4cae67969ee3dcaba6c5667514e11500d7ed28a99d36699b95816f1226ba8d7ef074238e5fcb5dc7d894885173b8362c2168f9e2a23ce50eeac992ecff89dd3a25858163f79c4a04f2d90f5e80a6052e83088182b51a302e116ce635c371a69aed7baf77940cbecfa02c83e52579c46c630221266900a74568791b0df496a44b36634f8f25d101150a7715c155d95c7f6bdccdfe87c224a940a0d597f779e4", 0xb9}, {&(0x7f0000002640)="0343e03f3d056ae9c7d174ac02ea68661322ec6116ad0c88049c93b5cb15af23181943d9f439eb3a826ce174fd325525ab67f8277de00bfcfa01c892c64951e59f198768350123680441", 0x4a}], 0xa, &(0x7f0000003840)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="eab80800"], 0x70, 0x2800}, {&(0x7f00000038c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000003cc0)=[{&(0x7f0000003940)="e64561dbc1ea209e36d1fab72b5376624c54f8b4ea75799a9f38ea13c563898748fef02b59e0d4b34d6c6c439edb9cde93147d649846c4cacb391462cc3f3a7b4a622eb16f74ea8a30f88c92847c578371fb3cbaae52f33cbb634631134a25f0c434a1689df96a19", 0x68}, {&(0x7f00000039c0)="e6ff817c290470c6627ab217ecd80a12cc9e6e4d3687646d97db46c097ce773e6b744380ee8edf6198a5f1f4f5f8fc0216cd03665651166d117e82d0d1c1", 0x3e}, {&(0x7f0000003a00)="b5b11fae5b80373d1fd5e9caba7a27309e2c0909446501c9ff92bcb806a3ea760e4d765e057b397b11e81d78080606356c47f3167cf255463166bbac18df8a1047a9ca1233a917087812fc8e41b3f511104ba70336556c75df456489fe63925163bb8032d74635e9b9dff672de755df3842e5d7aacd2e90dfde6b461450b50eaabe4176d1d407c77d41b7a701777856629ef5da8d3e120f28168a91bc3f794a326c27265b3b391b48e5e8d1cabdd51ce18a3e16806553e2f21f8d4c8f6da3f979c2329fbaa7488dee0c8fc1af8a77788cb9ba48bed60b2ba84a280da82051be908da899ce4ab52166768ec11f9a165062b1b17e8ccb7338c40d726", 0xfb}, {&(0x7f0000003b00)="fcefbe6735644c7d5230755f084d545389f1ee08a694e84aed7ac1b7f9e93090bc45697dab5937f17f7ddcab2c8641ad1698eb6c3d383399f5b0dac6", 0x3c}, {&(0x7f0000003b40)="94d257593a95fd7ecaa5da51720bcbaacb644076d6b557dbad813b21a8aa7ebb251c3c2049d2a4bb3aa0fabbd07404af57b88876064cb3650a1b044a819d21289a4735f7ad75073d8139bac2f55f9df7bb7713406b91c46b9d189194156753b10d0f79e2bdc6c987dba225df6533fe308916df29ff2a59ab158e539eaefdc4eda5957c228f052ebdff0a29a49b937301e1ed04fa26aa71f99aa0e2bfb47c4a8765eb1664677a38a06ac44b00496c4c139767e7294256d3ff13", 0xb9}, {&(0x7f0000003c00)="51f31d0a8633e983839f89e40872e2df3413e2bb596e0f3ae458f998ede6ef2adf794d8e923a88736a31aa05aeac682cd9a3d1f3425d5bb3b7b332bda5885ac49d42fafe7f198adc6b5acb1795329aa2cfbb085bbcaa9f5abf90e613ecdb245c2143cce0dbc71af2968510d713eba0110b7265f8e355ba692a53170abc04a08c77887ba79acec6d5ec64", 0x8a}], 0x6, &(0x7f0000003dc0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0x1}, {&(0x7f0000003e00)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000004180)=[{&(0x7f0000003e80)="9ecca3d219b515f5172190418c83f50da8445f21674cc534502250b5b0dafd9d674c339ac3a15890c136279820c5381190dc94d84e48588a23cb60d70acf3c785a59a7ddfe4ef7037ba2208b69160c2583fe840e8f67b4a5e75e5ab2a8e0aa230ee0dd5cdae3bf0ccd8eeab67e311ba2088caba3636fdff8da460607eee8404d22886c7acde64602f8666bfb934fc62657b53a0e6e4cb7d39bf2f313bc4202c65182c855a4574a42acb9c80be1830a4d2f03a40e352392adf389d3757d3767c5c41b956c66b618e554484897c9f1c3bf5e5dd64b0029", 0xd6}, {&(0x7f0000003f80)="98629a417a93350a8f7c50059c31dd7a541e4f119c39d4ea9a00ac49c2afb189fca247656f47c2f6db777b73311530a69ad4a7de15595dbcfcbee8b80550e5e59ed746ddb5488b5eeccc6f093f096511e1b12d82bf41c7b1c4b3c775a6aaf42a0f357793983da29f960ac8831be0d9a522d5193b1b2bed0956c53e0b014ca7b2d6af1c283113c124076038a7d8", 0x8d}, {&(0x7f0000004040)}, {&(0x7f0000004080)="9e2b685851574b5f68e57bd2c43485063f54d2469b89fb98f92a2176dbdb5fb573b90753cdb1e64c2dce878130d861ccee39f226235efa4a71926ef53e12c7539390cbd35e467d005c9ff5a46a9dbd9cfa43b89a743e59848a833c256e8de2a07f35d53e2139b060d8aca85666111f7383f8a8ea97e009469904834a5ce471764675a2852adeca262bd10757c5f4f1f4652c815e4c55a1fb436152f2eab9b19bab664433c98b579eaab7e604d2f1be1b94f67a0ba2ebd4e4d530495c5dc084d3b73a731c33ac66b0527b482f15", 0xcd}], 0x4, &(0x7f00000042c0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, r0]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xd0, 0x884}, {&(0x7f00000043c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000004680)=[{&(0x7f0000004440)="513324cc9eb0062cd0fcb7f17c2a0a6fe84c81b7c3db0017cf39b7660d3e93371df09529ff679a0704707d4fd10b045331f567c47223c13610333b7d59533680720c8c4ac19c8747bd51708790cefe1aeb76c60b1d4621c22ea59704476f42ca81be38da01b8a4cce8bdbc4cdd1e56f58bbdd45799764aacd4037546a490c650fe5d789feed76331d52bfe568a38284c94ee6a1d645baf8137a558beb9bfa4bd7aa10a7a03c15cfde6f4b229951d9bf1948c2411e3aa0479bb3bfd2ecf12755702e6a6da6d34225c3462d81839473c5c09455ec5c62b151903907cae6cb48e01140c2a9ce2cbc1a8ddb9dc3db4ba6dd2861c048d9c99", 0xf6}, {&(0x7f0000004540)="b6871e4cf68a4403d051d755f8c16fdf", 0x10}, {&(0x7f0000004580)="55350d94800cac8fb6bc3275debbfc17e616e42d1869513955bd949e47c677f71f3f5f64571c1aff2738c8273c77a971c9b6826646bcd98bd1f38f1331f972026b53a472ce169cadcc7b48aba64478705e415e5551e950582a8ee40b453bb65114f6609a249af850a9b4d286ec5548688920d446388d41fcdc72b4bdd5e2b29c8f6df78591b59be5d9e9e6bd40d66b7942252714e5a507ccd8eac12aec3535b9edcd52b9bf3e3522ab34bb287d10ed4067ab4d6891e3cffa02dd86b9070a54f8bc16c03f974949ef", 0xc8}], 0x3, &(0x7f0000005c40)=[@cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r1, 0x0, r4}}}], 0x78, 0x8001}], 0x8, 0x4000000) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x200002, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000002800)={0x20, r7, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2847}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_BEARER_GET(r5, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="14000000422caec030a50a1d0a175a0b8980ccb066f9f3cf4b23285814eec46327b52f0bb1c33a23b0e527135edfb284fc6eb4addedd0c2e3d2308b20dc85284deb49df604c3e40a576b4ab16d7b825a8119f069ea0b655777a4fd71e9c1028ba983d0c7355dc59521a2b17ccc6c403a20ddbc76d2f90dfd8329b3544742be89db0924f9ae29ad89424a6f5ccb64feef1f6fa5f84eebdd28d4bf83d43a0279808508c7cbac0b77339f5514998b91492f91980a6ae1bd21d1ad29c2fe9f", @ANYRES16=r7, @ANYBLOB="00082abd7000fcdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000000000000201000000000000000100000448e187c6f2bb5b83f503df8fc33d6b757c46bcc3478f10c7946ba006e4aca5fa75265969f83ed3337cdb64888613cd087317bd43a7c180f70d991b04f0c03f1d0474bd313bd2b0915aec144dd20c857b1f7b429c3b28813e0e319f501eb9310f0c2d01e0309517ff84db80056d26c4c0d1d7a669a70c56ab7a57bc5fef598876846b345f8d4c3ea804"], &(0x7f0000000140)=""/207, 0x4f, 0xcf, 0x8}, 0x20) r8 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYRES16=r8, @ANYBLOB="90002cbd7000fbdbdf250400000005000100010000001400020000000000000000000000fc0040000001080005000000000008000601800000000000000005000100000000467c555700000000000000000000000000005264ab"], 0x3}}, 0x20000054) sendmsg$NLBL_UNLABEL_C_STATICADD(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, r8, 0x100, 0x70bd29, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @broadcast}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1158.471418][T14607] syz-executor.4: page allocation failure: order:0, mode:0x300cca(GFP_HIGHUSER_MOVABLE|__GFP_THISNODE), nodemask=(null),cpuset=/,mems_allowed=0-1 20:26:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000"], 0x7c}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1158.581426][T14607] CPU: 0 PID: 14607 Comm: syz-executor.4 Not tainted 5.7.0-rc6-next-20200522-syzkaller #0 [ 1158.591903][T14607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1158.601973][T14607] Call Trace: [ 1158.605295][T14607] dump_stack+0x18f/0x20d [ 1158.609655][T14607] warn_alloc.cold+0x87/0x164 [ 1158.614166][T14628] BPF:Invalid string section [ 1158.614357][T14607] ? zone_watermark_ok_safe+0x260/0x260 [ 1158.624493][T14607] ? wait_for_completion+0x270/0x270 [ 1158.629813][T14607] __alloc_pages_slowpath.constprop.0+0x209f/0x2640 [ 1158.636451][T14607] ? warn_alloc+0x110/0x110 [ 1158.641010][T14607] __alloc_pages_nodemask+0x5d9/0x810 [ 1158.646406][T14607] ? debug_check_no_obj_freed+0x213/0x449 [ 1158.652756][T14607] ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640 [ 1158.659634][T14607] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1158.665658][T14607] alloc_new_node_page+0x398/0x450 [ 1158.670797][T14607] migrate_pages+0x546/0x28a0 [ 1158.675500][T14607] ? alloc_pages_current+0x200/0x200 [ 1158.680819][T14607] move_pages_and_store_status.isra.0+0x73/0x160 [ 1158.687178][T14607] kernel_move_pages+0xbc5/0x1600 [ 1158.692258][T14607] ? move_pages_and_store_status.isra.0+0x160/0x160 [ 1158.698882][T14607] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1158.704367][T14607] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 1158.710472][T14607] __x64_sys_move_pages+0xdd/0x1b0 [ 1158.715623][T14607] do_syscall_64+0xf6/0x7d0 [ 1158.720157][T14607] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1158.726074][T14607] RIP: 0033:0x45ca29 [ 1158.729986][T14607] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1158.749701][T14607] RSP: 002b:00007fd9b3c23c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000117 [ 1158.758129][T14607] RAX: ffffffffffffffda RBX: 00000000004f65c0 RCX: 000000000045ca29 [ 1158.766130][T14607] RDX: 00000000200000c0 RSI: 0000000000000001 RDI: 0000000000000000 [ 1158.774142][T14607] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 20:26:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f00000001c0)={r6}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000240)={r6, 0x1ff}, &(0x7f0000000280)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, 0x0, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_MAX_PEER_LINKS={0x6, 0x4, 0x5e}]}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x9, 0x2}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_MESH_CONFIG={0x24, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_PATH_REFRESH_TIME={0x8, 0x9, 0x5}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6}, @NL80211_MESHCONF_AUTO_OPEN_PLINKS={0x5, 0x7, 0x1a}, @NL80211_MESHCONF_HWMP_ACTIVE_PATH_TIMEOUT={0x8, 0xb, 0x9}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x404c045}, 0x4000080) 20:26:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000024000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:26:35 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1158.782138][T14607] R10: 000000002026bfec R11: 0000000000000246 R12: 00000000ffffffff [ 1158.790129][T14607] R13: 000000000000075e R14: 00000000004ca3b0 R15: 00007fd9b3c246d4 20:26:35 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1158.869226][T14636] BPF: (anon) type_id=0 bits_offset=0 [ 1158.885099][T14636] BPF: [ 1158.890699][T14636] BPF:Invalid type_id [ 1158.932140][T14636] BPF: [ 1158.932140][T14636] [ 1158.977441][T14640] BPF:[2] Invalid name_offset:3604480 20:26:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000003f0000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1159.025062][T14645] BPF: (anon) type_id=0 bits_offset=0 [ 1159.030521][T14645] BPF: [ 1159.035011][T14648] BPF:[2] Invalid name_offset:3604480 [ 1159.070136][T14645] BPF:Invalid type_id 20:26:35 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1159.141860][T14645] BPF: [ 1159.141860][T14645] 20:26:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x40000, 0x0) 20:26:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1159.386701][T14670] BPF:[2] Invalid name_offset:4128768 [ 1159.484889][T14674] BPF:[2] Invalid name_offset:4128768 20:26:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000480000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1159.561625][T14678] BPF: (anon) type_id=0 bits_offset=0 [ 1159.634329][T14678] BPF: [ 1159.672810][T14678] BPF:Invalid type_id 20:26:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1159.737522][T14678] BPF: [ 1159.737522][T14678] [ 1159.842569][T14680] BPF: (anon) type_id=0 bits_offset=0 [ 1159.848466][T14680] BPF: [ 1159.882970][T14682] BPF:[2] Invalid name_offset:4718592 [ 1159.887056][T14680] BPF:Invalid type_id 20:26:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000004c0000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1159.942839][T14689] BPF:[2] Invalid name_offset:4718592 [ 1159.965508][T14680] BPF: [ 1159.965508][T14680] 20:26:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0xcc14ea5}], 0x4801, 0x0) 20:26:36 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:36 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1160.206815][T14695] BPF:[2] Invalid name_offset:4980736 20:26:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000600000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1160.252918][T14700] BPF:[2] Invalid name_offset:4980736 [ 1160.278084][T14703] BPF: (anon) type_id=0 bits_offset=0 [ 1160.317880][T14703] BPF: [ 1160.342345][T14703] BPF:Invalid type_id [ 1160.381026][T14703] BPF: [ 1160.381026][T14703] [ 1160.437558][T14710] BPF: (anon) type_id=0 bits_offset=0 [ 1160.445122][T14710] BPF: [ 1160.489897][T14710] BPF:Invalid type_id [ 1160.536439][T14710] BPF: [ 1160.536439][T14710] 20:26:36 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:36 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1160.649762][T14721] BPF:[2] Invalid name_offset:6291456 [ 1160.710447][T14723] BPF:[2] Invalid name_offset:6291456 20:26:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000680000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1160.859505][T14607] Mem-Info: [ 1160.883372][T14607] active_anon:463154 inactive_anon:28774 isolated_anon:1091 [ 1160.883372][T14607] active_file:6292 inactive_file:15819 isolated_file:0 [ 1160.883372][T14607] unevictable:305 dirty:64 writeback:4 unstable:0 [ 1160.883372][T14607] slab_reclaimable:19411 slab_unreclaimable:148687 [ 1160.883372][T14607] mapped:58665 shmem:29815 pagetables:84602 bounce:0 [ 1160.883372][T14607] free:682553 free_pcp:903 free_cma:0 20:26:37 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1161.060233][T14735] BPF: (anon) type_id=0 bits_offset=0 [ 1161.136124][T14735] BPF: [ 1161.140084][T14742] BPF:[2] Invalid name_offset:6815744 [ 1161.179775][T14735] BPF:Invalid type_id [ 1161.199157][T14745] BPF:[2] Invalid name_offset:6815744 [ 1161.223868][T14735] BPF: [ 1161.223868][T14735] 20:26:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000006c0000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:37 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1161.370023][T14607] Node 0 active_anon:1406404kB inactive_anon:67372kB active_file:56kB inactive_file:4kB unevictable:1036kB isolated(anon):0kB isolated(file):0kB mapped:217448kB dirty:20kB writeback:0kB shmem:71388kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 976896kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1161.390993][T14747] BPF: (anon) type_id=0 bits_offset=0 20:26:37 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:37 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1161.493851][T14747] BPF: [ 1161.515519][T14747] BPF:Invalid type_id [ 1161.551086][T14747] BPF: [ 1161.551086][T14747] 20:26:37 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1161.621861][T14752] BPF:[2] Invalid name_offset:7077888 20:26:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000740000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1161.672773][T14756] BPF:[2] Invalid name_offset:7077888 [ 1161.724790][T14607] Node 1 active_anon:448320kB inactive_anon:41560kB active_file:25132kB inactive_file:63268kB unevictable:184kB isolated(anon):2032kB isolated(file):0kB mapped:17216kB dirty:184kB writeback:100kB shmem:41716kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 20:26:38 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1162.057327][T14766] BPF:[2] Invalid name_offset:7602176 [ 1162.067350][T14607] Node 0 DMA free:10268kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:1480kB inactive_anon:24kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:160kB pagetables:1076kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 20:26:38 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1162.107771][T14770] BPF:[2] Invalid name_offset:7602176 20:26:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000007a0000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:38 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:38 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1162.446843][T14607] lowmem_reserve[]: 0 2514 2514 2514 2514 [ 1162.518895][T14607] Node 0 DMA32 free:90084kB min:87112kB low:96088kB high:105064kB reserved_highatomic:2048KB active_anon:1406184kB inactive_anon:67348kB active_file:48kB inactive_file:12kB unevictable:1036kB writepending:8kB present:3129332kB managed:2578004kB mlocked:1036kB kernel_stack:24420kB pagetables:56844kB bounce:0kB free_pcp:1496kB local_pcp:420kB free_cma:0kB [ 1162.573403][T14783] BPF:[2] Invalid name_offset:7995392 20:26:38 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1162.684769][T14783] BPF:[2] Invalid name_offset:7995392 20:26:39 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000d10000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1162.936189][T14607] lowmem_reserve[]: 0 0 0 0 0 [ 1162.972483][T14607] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 20:26:39 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1163.117289][T14800] BPF:[2] Invalid name_offset:13697024 20:26:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000ffff0f00000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1163.162679][T14804] BPF:[2] Invalid name_offset:13697024 [ 1163.225734][T14607] lowmem_reserve[]: 0 0 0 0 0 [ 1163.257929][T14607] Node 1 Normal free:2641064kB min:53972kB low:67464kB high:80956kB reserved_highatomic:0KB active_anon:447448kB inactive_anon:32492kB active_file:25152kB inactive_file:63272kB unevictable:184kB writepending:296kB present:3932160kB managed:3870200kB mlocked:184kB kernel_stack:86692kB pagetables:281100kB bounce:0kB free_pcp:1696kB local_pcp:1492kB free_cma:0kB 20:26:39 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:39 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:39 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1163.501468][T14607] lowmem_reserve[]: 0 0 0 0 0 [ 1163.561365][T14607] Node 0 DMA: 5*4kB (UM) 8*8kB (UME) 29*16kB (UM) 28*32kB (UME) 8*64kB (UME) 3*128kB (UME) 1*256kB (M) 1*512kB (E) 1*1024kB (E) 3*2048kB (ME) 0*4096kB = 10276kB [ 1163.580390][T14810] BPF:[2] Invalid name_offset:268435200 20:26:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000ffffff00000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1163.701858][T14607] Node 0 DMA32: 648*4kB (ME) 844*8kB (UEH) 1086*16kB (UMEH) 385*32kB (UMEH) 145*64kB (UME) 93*128kB (UME) 47*256kB (ME) 18*512kB (UM) 8*1024kB (M) 0*2048kB 0*4096kB = 89664kB 20:26:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000007a0000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1163.868978][T14607] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 1163.913118][T14827] BPF:[2] Invalid name_offset:4294967040 20:26:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000001000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000007a0000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1164.001854][T14607] Node 1 Normal: 27*4kB (E) 788*8kB (ME) 552*16kB (ME) 622*32kB (UME) 642*64kB (UM) 597*128kB (UM) 365*256kB (UME) 180*512kB (UME) 54*1024kB (UME) 1*2048kB (U) 547*4096kB (M) = 2636108kB [ 1164.168611][T14607] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 20:26:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000054000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1164.252945][T14607] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1164.254662][T14839] BPF:[2] PTR (anon) [ 1164.326823][T14841] BPF:[2] PTR (anon) [ 1164.337843][T14839] BPF:type_id=1 [ 1164.365934][T14841] BPF:type_id=1 20:26:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000007a0000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1164.369374][T14607] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1164.382490][T14839] BPF: [ 1164.404506][T14839] BPF:vlen != 0 [ 1164.423894][T14841] BPF: [ 1164.435430][T14839] BPF: [ 1164.435430][T14839] [ 1164.448435][T14841] BPF:vlen != 0 [ 1164.460943][T14607] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 20:26:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000002000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1164.484901][T14841] BPF: [ 1164.484901][T14841] [ 1164.493910][T14848] BPF: (anon) type_id=0 bits_offset=0 [ 1164.535908][T14607] 36813 total pagecache pages [ 1164.544544][T14848] BPF: [ 1164.565853][T14848] BPF:Invalid type_id 20:26:40 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1164.586208][T14607] 0 pages in swap cache 20:26:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000054000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:26:40 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1164.610593][T14848] BPF: [ 1164.610593][T14848] [ 1164.626599][T14607] Swap cache stats: add 0, delete 0, find 0/0 20:26:40 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1164.701483][T14607] Free swap = 0kB [ 1164.705299][T14607] Total swap = 0kB [ 1164.709143][T14607] 1965979 pages RAM [ 1164.765257][T14852] BPF:[2] PTR (anon) [ 1164.773126][T14607] 0 pages HighMem/MovableOnly [ 1164.780198][T14852] BPF:type_id=1 [ 1164.789043][T14859] BPF:[2] PTR (anon) [ 1164.815298][T14852] BPF: [ 1164.819358][T14859] BPF:type_id=1 [ 1164.839582][T14607] 349951 pages reserved [ 1164.851296][T14852] BPF:vlen != 0 [ 1164.872032][T14859] BPF: [ 1164.882050][T14852] BPF: [ 1164.882050][T14852] [ 1164.887240][T14607] 0 pages cma reserved [ 1164.918318][T14859] BPF:vlen != 0 20:26:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000054000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1164.952986][T14859] BPF: [ 1164.952986][T14859] 20:26:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000003000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000054000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1165.344215][T14873] BPF:[2] PTR (anon) [ 1165.386649][T14873] BPF:type_id=1 [ 1165.440703][T14873] BPF: [ 1165.463716][T14873] BPF:vlen != 0 [ 1165.497300][T14873] BPF: [ 1165.497300][T14873] 20:26:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800"], 0x7c}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1165.550926][T14875] BPF:[2] PTR (anon) [ 1165.555897][T14875] BPF:type_id=1 [ 1165.559912][T14875] BPF: [ 1165.613671][T14875] BPF:vlen != 0 [ 1165.644697][T14875] BPF: [ 1165.644697][T14875] 20:26:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800"], 0x7c}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:26:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000004000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:42 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:42 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:42 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800"], 0x7c}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1166.060423][T14894] BPF:[2] PTR (anon) [ 1166.102030][T14894] BPF:type_id=1 [ 1166.121841][T14900] BPF:[2] PTR (anon) [ 1166.133911][T14894] BPF: [ 1166.160517][T14894] BPF:vlen != 0 [ 1166.165922][T14900] BPF:type_id=1 [ 1166.187498][T14894] BPF: [ 1166.187498][T14894] [ 1166.194064][T14900] BPF: [ 1166.223051][T14900] BPF:vlen != 0 20:26:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000005000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1166.253498][T14900] BPF: [ 1166.253498][T14900] 20:26:42 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1166.569852][T14914] BPF:[2] PTR (anon) [ 1166.606989][T14914] BPF:type_id=1 [ 1166.648721][T14914] BPF: [ 1166.664150][T14918] BPF:[2] PTR (anon) [ 1166.678090][T14914] BPF:vlen != 0 20:26:42 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1166.718503][T14918] BPF:type_id=1 [ 1166.725855][T14914] BPF: [ 1166.725855][T14914] [ 1166.756768][T14918] BPF: [ 1166.787917][T14918] BPF:vlen != 0 [ 1166.815027][T14918] BPF: [ 1166.815027][T14918] 20:26:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000006000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:43 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:43 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:43 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:43 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1167.244116][T14932] BPF:[2] PTR (anon) [ 1167.264402][T14934] BPF:[2] PTR (anon) [ 1167.300269][T14932] BPF:type_id=1 [ 1167.334393][T14932] BPF: [ 1167.336285][T14934] BPF:type_id=1 [ 1167.354408][T14932] BPF:vlen != 0 [ 1167.385734][T14932] BPF: [ 1167.385734][T14932] [ 1167.394364][T14934] BPF: [ 1167.425875][T14934] BPF:vlen != 0 [ 1167.457966][T14934] BPF: [ 1167.457966][T14934] 20:26:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000007000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000006000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000006000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1168.105654][T14947] BPF:[2] PTR (anon) 20:26:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000006000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1168.142660][T14947] BPF:type_id=1 [ 1168.142725][T14949] BPF:[2] PTR (anon) [ 1168.163926][T14947] BPF: [ 1168.182370][T14949] BPF:type_id=1 [ 1168.187432][T14947] BPF:vlen != 0 20:26:44 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1168.198962][T14949] BPF: [ 1168.204586][T14947] BPF: [ 1168.204586][T14947] [ 1168.216762][T14949] BPF:vlen != 0 [ 1168.233581][T14949] BPF: [ 1168.233581][T14949] 20:26:44 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000008000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:44 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1168.444301][T14961] BPF:[2] PTR (anon) [ 1168.474472][T14964] BPF:[2] PTR (anon) [ 1168.481397][T14961] BPF:type_id=1 [ 1168.504999][T14961] BPF: 20:26:44 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1168.527017][T14961] BPF:vlen != 0 [ 1168.532885][T14964] BPF:type_id=1 [ 1168.556843][T14961] BPF: [ 1168.556843][T14961] [ 1168.561243][T14964] BPF: [ 1168.571684][T14964] BPF:vlen != 0 [ 1168.609859][T14964] BPF: [ 1168.609859][T14964] 20:26:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000000a000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:45 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1168.936016][T14972] BPF:[2] PTR (anon) [ 1168.980631][T14972] BPF:type_id=1 [ 1168.992625][T14974] BPF:[2] PTR (anon) [ 1169.014821][T14972] BPF: [ 1169.043222][T14974] BPF:type_id=1 [ 1169.052135][T14972] BPF:vlen != 0 [ 1169.073798][T14974] BPF: [ 1169.097019][T14972] BPF: [ 1169.097019][T14972] [ 1169.114765][T14974] BPF:vlen != 0 [ 1169.156421][T14974] BPF: [ 1169.156421][T14974] 20:26:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000020000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:45 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:45 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1169.422572][T14986] BPF:[2] PTR (anon) 20:26:45 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:45 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1169.447256][T14989] BPF:[2] PTR (anon) [ 1169.455503][T14986] BPF:type_id=1 [ 1169.492158][T14986] BPF: [ 1169.497703][T14989] BPF:type_id=1 [ 1169.510561][T14986] BPF:vlen != 0 [ 1169.521158][T14989] BPF: [ 1169.535786][T14986] BPF: [ 1169.535786][T14986] 20:26:45 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1169.545055][T14989] BPF:vlen != 0 [ 1169.561041][T14989] BPF: [ 1169.561041][T14989] 20:26:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000024000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:46 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1169.909065][T15010] BPF:[2] PTR (anon) [ 1169.952302][T15016] BPF:[2] PTR (anon) [ 1169.970087][T15010] BPF:type_id=1 [ 1170.013611][T15016] BPF:type_id=1 [ 1170.013756][T15010] BPF: [ 1170.051104][T15010] BPF:vlen != 0 [ 1170.056203][T15016] BPF: [ 1170.088418][T15010] BPF: [ 1170.088418][T15010] [ 1170.094399][T15016] BPF:vlen != 0 [ 1170.136075][T15016] BPF: [ 1170.136075][T15016] 20:26:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000030000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:46 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:46 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1170.557499][T15023] BPF:[2] PTR (anon) 20:26:46 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1170.594262][T15023] BPF:type_id=1 [ 1170.603063][T15027] BPF:[2] PTR (anon) [ 1170.615260][T15027] BPF:type_id=1 [ 1170.619978][T15023] BPF: [ 1170.634483][T15023] BPF:vlen != 0 20:26:46 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1170.654601][T15027] BPF: [ 1170.663194][T15023] BPF: [ 1170.663194][T15023] [ 1170.676148][T15027] BPF:vlen != 0 [ 1170.707104][T15027] BPF: [ 1170.707104][T15027] 20:26:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000037000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:47 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:47 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1171.195167][T15042] BPF:[2] PTR (anon) [ 1171.199603][T15042] BPF:type_id=1 [ 1171.235227][T15042] BPF: [ 1171.276623][T15042] BPF:vlen != 0 [ 1171.322738][T15042] BPF: [ 1171.322738][T15042] 20:26:47 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1171.381052][T15046] BPF:[2] PTR (anon) [ 1171.385425][T15046] BPF:type_id=1 [ 1171.389286][T15046] BPF: [ 1171.457507][T15046] BPF:vlen != 0 [ 1171.487936][T15046] BPF: [ 1171.487936][T15046] 20:26:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000003f000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:48 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:48 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:48 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1171.935769][T15054] BPF:[2] PTR (anon) 20:26:48 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1171.976584][T15059] BPF:[2] PTR (anon) [ 1171.979217][T15054] BPF:type_id=1 [ 1171.995288][T15054] BPF: 20:26:48 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1172.017879][T15054] BPF:vlen != 0 [ 1172.029533][T15059] BPF:type_id=1 [ 1172.060072][T15054] BPF: [ 1172.060072][T15054] [ 1172.070761][T15059] BPF: [ 1172.104742][T15059] BPF:vlen != 0 [ 1172.140899][T15059] BPF: [ 1172.140899][T15059] 20:26:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000048000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:48 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1172.520928][T15073] BPF:[2] PTR (anon) [ 1172.574366][T15073] BPF:type_id=1 [ 1172.604222][T15073] BPF: [ 1172.633174][T15077] BPF:[2] PTR (anon) [ 1172.677879][T15073] BPF:vlen != 0 [ 1172.701490][T15077] BPF:type_id=1 [ 1172.721301][T15073] BPF: [ 1172.721301][T15073] [ 1172.748755][T15077] BPF: [ 1172.783341][T15077] BPF:vlen != 0 [ 1172.828894][T15077] BPF: [ 1172.828894][T15077] 20:26:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000004c000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:49 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:49 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1173.123496][T15081] BPF:[2] PTR (anon) [ 1173.130163][T15081] BPF:type_id=1 [ 1173.163427][T15086] BPF:[2] PTR (anon) [ 1173.170603][T15081] BPF: 20:26:49 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1173.180514][T15086] BPF:type_id=1 [ 1173.187403][T15081] BPF:vlen != 0 [ 1173.215394][T15086] BPF: [ 1173.218632][T15081] BPF: [ 1173.218632][T15081] [ 1173.234925][T15086] BPF:vlen != 0 20:26:49 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000060000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:49 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1173.256888][T15086] BPF: [ 1173.256888][T15086] 20:26:49 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1173.542467][T15105] BPF:[2] PTR (anon) 20:26:49 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1173.576287][T15109] BPF:[2] PTR (anon) [ 1173.594491][T15105] BPF:type_id=1 [ 1173.628109][T15109] BPF:type_id=1 [ 1173.632997][T15105] BPF: [ 1173.652261][T15105] BPF:vlen != 0 [ 1173.660279][T15109] BPF: [ 1173.688695][T15105] BPF: [ 1173.688695][T15105] [ 1173.694362][T15109] BPF:vlen != 0 20:26:49 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000068000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1173.744043][T15109] BPF: [ 1173.744043][T15109] 20:26:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000060000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1174.048769][T15121] BPF:[2] PTR (anon) [ 1174.104422][T15121] BPF:type_id=1 [ 1174.108811][T15124] BPF:[2] PTR (anon) [ 1174.117720][T15121] BPF: 20:26:50 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1174.155090][T15124] BPF:type_id=1 [ 1174.174637][T15121] BPF:vlen != 0 [ 1174.186783][T15124] BPF: [ 1174.204504][T15121] BPF: [ 1174.204504][T15121] [ 1174.219044][T15124] BPF:vlen != 0 [ 1174.243513][T15124] BPF: [ 1174.243513][T15124] 20:26:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000060000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000006c000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:50 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:50 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000060000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:50 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1174.492923][T15136] BPF:[2] PTR (anon) [ 1174.530805][T15136] BPF:type_id=1 [ 1174.538644][T15141] BPF:[2] PTR (anon) [ 1174.561669][T15141] BPF:type_id=1 [ 1174.573444][T15136] BPF: 20:26:50 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1174.612851][T15136] BPF:vlen != 0 [ 1174.617981][T15141] BPF: [ 1174.633437][T15141] BPF:vlen != 0 [ 1174.642003][T15136] BPF: [ 1174.642003][T15136] [ 1174.688088][T15141] BPF: [ 1174.688088][T15141] 20:26:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000074000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:51 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:51 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:51 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1175.085337][T15160] BPF:[2] PTR (anon) [ 1175.140594][T15163] BPF:[2] PTR (anon) [ 1175.152011][T15160] BPF:type_id=1 [ 1175.178212][T15163] BPF:type_id=1 [ 1175.186360][T15160] BPF: [ 1175.206255][T15160] BPF:vlen != 0 [ 1175.213518][T15163] BPF: [ 1175.239988][T15160] BPF: [ 1175.239988][T15160] [ 1175.247213][T15163] BPF:vlen != 0 20:26:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000007a000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1175.270334][T15163] BPF: [ 1175.270334][T15163] 20:26:51 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:51 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:51 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1175.540413][T15173] BPF:[2] PTR (anon) [ 1175.544461][T15173] BPF:type_id=1 [ 1175.547941][T15173] BPF: [ 1175.590667][T15179] BPF:[2] PTR (anon) [ 1175.598663][T15179] BPF:type_id=1 [ 1175.604356][T15173] BPF:vlen != 0 [ 1175.615942][T15179] BPF: [ 1175.625352][T15173] BPF: [ 1175.625352][T15173] 20:26:51 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1175.637723][T15179] BPF:vlen != 0 20:26:51 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000000000d1000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1175.666245][T15179] BPF: [ 1175.666245][T15179] 20:26:52 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:52 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1176.018234][T15199] BPF:[2] PTR (anon) [ 1176.066568][T15202] BPF:[2] PTR (anon) [ 1176.072633][T15199] BPF:type_id=1 [ 1176.097112][T15199] BPF: [ 1176.101361][T15202] BPF:type_id=1 [ 1176.124414][T15199] BPF:vlen != 0 [ 1176.153897][T15202] BPF: [ 1176.179487][T15199] BPF: [ 1176.179487][T15199] [ 1176.189465][T15202] BPF:vlen != 0 [ 1176.224133][T15202] BPF: [ 1176.224133][T15202] 20:26:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000000fffff000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:52 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:52 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1176.581915][T15217] BPF:[2] Invalid name_offset:4279173120 20:26:52 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1176.631772][T15223] BPF:[2] Invalid name_offset:4279173120 20:26:52 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:52 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:52 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000ffffff000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:53 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:53 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1177.042807][T15241] BPF:[2] Invalid name_offset:4294901760 [ 1177.098252][T15245] BPF:[2] Invalid name_offset:4294901760 20:26:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000020000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:53 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1177.419848][T15253] BPF:[2] Invalid name_offset:131072 [ 1177.465990][T15257] BPF:[2] Invalid name_offset:131072 20:26:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000030000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:53 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:53 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1177.771092][T15264] BPF:[2] Invalid name_offset:196608 20:26:54 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:54 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000040000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:54 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:54 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1178.054243][T15280] BPF:[2] Invalid name_offset:262144 [ 1178.090706][T15284] BPF:[2] Invalid name_offset:262144 20:26:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000050000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:54 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:54 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1178.491488][T15300] BPF:[2] Invalid name_offset:327680 [ 1178.541166][T15306] BPF:[2] Invalid name_offset:327680 20:26:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000060000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:54 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:55 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1178.846462][T15311] BPF:[2] Invalid name_offset:393216 [ 1178.883253][T15317] BPF:[2] Invalid name_offset:393216 20:26:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000070000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:55 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:55 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:55 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:55 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:55 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1179.404046][T15334] BPF:[2] Invalid name_offset:458752 [ 1179.461824][T15339] BPF:[2] Invalid name_offset:458752 20:26:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000080000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:55 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:55 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1179.696229][T15346] BPF:[2] Invalid name_offset:524288 20:26:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000000a0000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:55 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:56 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1180.020840][T15361] BPF:[2] Invalid name_offset:655360 20:26:56 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000240000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1180.065469][T15363] BPF:[2] Invalid name_offset:655360 20:26:56 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:56 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:56 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1180.255006][T15372] BPF:[2] Invalid name_offset:2359296 20:26:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000300000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:56 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:56 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:56 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000370000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x4146, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x1, 0x7bb, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r1, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r1}, 0x38) r2 = fcntl$dupfd(r0, 0x406, r1) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xb1b225d1ca655e00}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r3, 0x1, 0x70bd2c, 0x25dfdbfb, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc000}, 0x20008081) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1180.635378][T15395] BPF:[2] Invalid name_offset:3145728 20:26:56 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:56 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:56 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1180.791891][T15402] BPF: (anon) type_id=0 bits_offset=0 [ 1180.842091][T15402] BPF: [ 1180.855493][T15407] BPF:[2] Invalid name_offset:3604480 [ 1180.868702][T15402] BPF:Invalid type_id [ 1180.892435][T15419] BPF:[2] Invalid name_offset:3604480 20:26:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000480000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1180.939239][T15402] BPF: [ 1180.939239][T15402] 20:26:57 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1181.006538][T15422] BPF: (anon) type_id=0 bits_offset=0 20:26:57 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1181.057090][T15422] BPF: [ 1181.090168][T15422] BPF:Invalid type_id [ 1181.124868][T15422] BPF: [ 1181.124868][T15422] 20:26:57 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@ng={0x4, 0x4, "c2611c2ca19b65efa37f9da1"}, 0xe, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06855c8, &(0x7f0000000080)={0xf, 0x0, {0x54, 0x1f, 0x401, {0x800, 0x7f}, {0x1, 0x1f}, @ramp={0x25, 0x20, {0x6, 0x95, 0x14f, 0x958a}}}, {0x53, 0x8, 0xfffc, {0x80}, {0x5, 0x9c00}, @ramp={0x9, 0x3ff, {0x0, 0x4, 0x7fff}}}}) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0x3, &(0x7f0000000340)=[{&(0x7f00000003c0)="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", 0x1ab, 0x400}, {&(0x7f0000000080), 0x0, 0x8}, {&(0x7f0000000240)="0e53bae2beb04061b838ebc2354b01e36c5ad9b578ea3f9a07b03b4b1c0f0cef77df81129c666d0bf7b871e1aea2f72a7d8fcfb6f21ee7e5e9d6c720a6071d952f9149eced5d73bc64c7414662f9d523d0b0fd02d33d7200f526c249c18cffa4910321d119db1a1987ebf8e3e94979d5cd4e4b832b4e98601e5fc42e877434e5b58c10e72b9b9fe261c456b8826c91db55f158e6760d7f62442315c29cbbee95b3f967f193eb2046e7f26731b5b557d1f9db3c4b902019ecf9852346a1506bd8b0cfbad171016520b7bcb78ddaf75d51801e667f1c99180ddfb23b1d51499fa5397807a330", 0xe5, 0x1}], 0x4801, 0x0) 20:26:57 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1181.277779][T15429] BPF:[2] Invalid name_offset:4718592 20:26:57 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1181.337059][T15432] BPF:[2] Invalid name_offset:4718592 20:26:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000004c0000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:57 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1181.559932][T15441] BPF:Invalid string section 20:26:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$netlink(r1, 0x10e, 0x9, &(0x7f0000000140)=""/193, &(0x7f0000000040)=0xc1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:26:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000600000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1181.662407][T15446] BPF:[2] Invalid name_offset:4980736 [ 1181.691598][T15448] BPF:[2] Invalid name_offset:4980736 20:26:58 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:58 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:58 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:58 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1181.850094][T15453] BPF: (anon) type_id=0 bits_offset=0 [ 1181.855568][T15453] BPF: [ 1181.858355][T15453] BPF:Invalid type_id 20:26:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000680000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1181.932563][T15458] BPF:[2] Invalid name_offset:6291456 [ 1181.952723][T15453] BPF: [ 1181.952723][T15453] 20:26:58 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1182.084149][T15471] BPF: (anon) type_id=0 bits_offset=0 [ 1182.117455][T15471] BPF: [ 1182.163865][T15471] BPF:Invalid type_id 20:26:58 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1182.193829][T15471] BPF: [ 1182.193829][T15471] 20:26:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6595}, 0x0, 0x5, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000000000000000020100000000030000010000043538e1bf3559637165dec01a4f413b06b0a23eb471acc5286453cf6deeef1178a2c8d46436a045"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) r0 = socket(0x18, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000840)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "b187fe38135f58ca008c966b686888442f25d5a2da7d0e9431b00a6a80a583880037fa828f1f6aae668593dae96ce0115e947568e4356e986a3acbac2c7246d31ab66b51977f09f6bf78dc7122dcf5207ec07969b69aedfd7de121b654ab6c7dcce6ffce8153e9f0b9cc6e8c106967a4a0a8bcc8632a0c1fc2f5388dacb491aaeaa7bf137b113ad908fe0e3a7bd8d025d9a31a3a05a2a4de901a24fb9cda9be42bbf1aa82ddecd48fff531b66b4851693095625a4333e5825fddd4ac195d2ece15789b96ea48b886c931070031493a0648a50d715be666149b4b17c11a94deedc59b4fc246b243bc822e8857cda92dde4d128e27e1d1ae02ec5684a4d082ba04"}, @TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x60}}]}}]}, 0x148}}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000040)={r1, 0x1, 0x6}, 0x10) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1182.357780][T15484] BPF:[2] Invalid name_offset:6815744 [ 1182.392287][T15489] BPF:[2] Invalid name_offset:6815744 20:26:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c00020008"], 0x7c}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:26:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000006c0000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1182.488618][T15493] BPF:Invalid string section 20:26:58 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1182.580074][T15497] BPF:Invalid string section 20:26:58 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1182.790853][T15506] BPF:[2] Invalid name_offset:7077888 [ 1182.844659][T15508] BPF:[2] Invalid name_offset:7077888 20:26:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c00020008"], 0x7c}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:26:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c00020008"], 0x7c}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:26:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000740000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14, 0x0, @thr={&(0x7f0000000200)="dc5261133c8e9f8f77517e04258454", &(0x7f0000000400)="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"}}, &(0x7f00000001c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x3938700}}, &(0x7f00000001c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004c7905eb9f97a112498b1e227de9e62e534d3bf0d5dc7e40c0247782e4b2c298ffdfb94776e0c044b2ae5ad8423fa78e87e067cd76bc2330dc67896a3e0b089bf62713907515bd495f187c252e0308da2502950f30f784258781241d5836a7dc2927c7a51f5a435a244c92693838998392c134c6551414d0238e925f4e9704b20d293364a91dcd522d77ee33358692c9048fe47410b8e1f93dcf548826558f4e550ebaddbf40c06c617d4aca05a959fae252db9f7aac3e89698b15dc8d24e263c120c1434f29d15857b215f30ee893a2e919aa4e1e765b2e883e6987c1b64"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r1, 0x0) setgid(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x4, 0x0, &(0x7f0000000280)) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1c, &(0x7f0000000040)=""/30, &(0x7f0000000140)=0x1e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x4, 0x0, &(0x7f0000000280)) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000240), &(0x7f0000001400)=0x14) 20:26:59 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1183.262727][T15520] BPF:[2] Invalid name_offset:7602176 [ 1183.297711][T15518] BPF:Invalid string section [ 1183.331788][T15527] BPF:[2] Invalid name_offset:7602176 20:26:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c00020008"], 0x7c}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:26:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000007a0000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:26:59 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c00020008"], 0x7c}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:26:59 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:26:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c00020008"], 0x7c}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1183.704951][T15536] BPF:[2] Invalid name_offset:7995392 [ 1183.767006][T15542] BPF:[2] Invalid name_offset:7995392 20:27:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000d10000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1183.812020][T15541] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1183.885782][T15541] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.5'. 20:27:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c00020008"], 0x7c}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:27:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c00020008"], 0x7c}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:27:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000300000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1184.112722][T15551] BPF:[2] Invalid name_offset:13697024 [ 1184.147128][T15553] BPF:[2] Invalid name_offset:13697024 [ 1184.347319][T15560] BPF:[2] Invalid name_offset:50331648 [ 1184.382872][T15561] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1184.386906][T15564] BPF:[2] Invalid name_offset:50331648 [ 1184.460894][T15561] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.5'. 20:27:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c00020008"], 0x7c}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:27:02 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:27:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000500000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:27:02 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:27:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000140)={0x2, {0x2, 0x9, 0x101, 0xe0, 0x3, 0x3}}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:27:02 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1186.237829][T15580] BPF:[2] Invalid name_offset:83886080 20:27:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000600000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1186.397287][T15588] BPF: (anon) type_id=0 bits_offset=0 [ 1186.444431][T15588] BPF: 20:27:02 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1186.471610][T15588] BPF:Invalid type_id [ 1186.510384][T15578] warn_alloc: 2 callbacks suppressed [ 1186.510405][T15578] syz-executor.5: page allocation failure: order:0, mode:0x300cca(GFP_HIGHUSER_MOVABLE|__GFP_THISNODE), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 1186.561749][T15588] BPF: [ 1186.561749][T15588] 20:27:02 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1186.741339][T15592] BPF: (anon) type_id=0 bits_offset=0 [ 1186.754432][T15578] CPU: 1 PID: 15578 Comm: syz-executor.5 Not tainted 5.7.0-rc6-next-20200522-syzkaller #0 [ 1186.764478][T15578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1186.774549][T15578] Call Trace: [ 1186.777876][T15578] dump_stack+0x18f/0x20d [ 1186.782336][T15578] warn_alloc.cold+0x87/0x164 [ 1186.787040][T15578] ? zone_watermark_ok_safe+0x260/0x260 [ 1186.792624][T15578] ? wait_for_completion+0x270/0x270 [ 1186.797951][T15578] __alloc_pages_slowpath.constprop.0+0x209f/0x2640 [ 1186.804586][T15578] ? warn_alloc+0x110/0x110 [ 1186.809150][T15578] __alloc_pages_nodemask+0x5d9/0x810 [ 1186.814580][T15578] ? debug_check_no_obj_freed+0x213/0x449 [ 1186.820330][T15578] ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640 [ 1186.821304][T15592] BPF: [ 1186.827205][T15578] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1186.827244][T15578] alloc_new_node_page+0x398/0x450 [ 1186.827263][T15578] migrate_pages+0x546/0x28a0 [ 1186.827282][T15578] ? alloc_pages_current+0x200/0x200 [ 1186.827306][T15578] move_pages_and_store_status.isra.0+0x73/0x160 [ 1186.857539][T15578] kernel_move_pages+0xbc5/0x1600 [ 1186.862602][T15578] ? move_pages_and_store_status.isra.0+0x160/0x160 [ 1186.869232][T15578] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1186.874724][T15578] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 1186.880830][T15578] __x64_sys_move_pages+0xdd/0x1b0 [ 1186.885998][T15578] do_syscall_64+0xf6/0x7d0 [ 1186.890441][T15596] BPF:[2] Invalid name_offset:100663296 [ 1186.890672][T15578] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1186.890688][T15578] RIP: 0033:0x45ca29 [ 1186.890706][T15578] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1186.890714][T15578] RSP: 002b:00007f28da872c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000117 [ 1186.890734][T15578] RAX: ffffffffffffffda RBX: 00000000004f65c0 RCX: 000000000045ca29 20:27:03 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1186.942146][T15578] RDX: 00000000200000c0 RSI: 0000000000000001 RDI: 0000000000000000 [ 1186.947199][T15592] BPF:Invalid type_id [ 1186.950146][T15578] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1186.950156][T15578] R10: 000000002026bfec R11: 0000000000000246 R12: 00000000ffffffff [ 1186.950165][T15578] R13: 000000000000075e R14: 00000000004ca3b0 R15: 00007f28da8736d4 [ 1187.002962][T15601] BPF:[2] Invalid name_offset:100663296 20:27:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000700000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1187.174852][T15592] BPF: [ 1187.174852][T15592] 20:27:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000002dfffffff03040000000001000004000000000000000000000000000000f0676f9bf26922f551c12a8b2cc47f5bd69d6cbe2f6924025fc356c4f9ff1997d2ea678bb5d5861cea32d1824024f141047385afedef6e3ae81d80d40e4bbc4c573fd86739d81925cb5be722638468d07a2dbb7d6a1b9eed0fc91574ac8bd939d2c59450280be9761a1e252075c0753ab752541217f9"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000040)) 20:27:03 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:27:03 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1187.339278][T15615] BPF:Invalid string section [ 1187.348677][T15610] BPF:[2] Invalid name_offset:117440512 20:27:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000a00000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1187.413340][T15614] BPF:[2] Invalid name_offset:117440512 [ 1187.631363][T15627] BPF:[2] Invalid name_offset:167772160 [ 1187.666039][T15629] BPF:[2] Invalid name_offset:167772160 [ 1188.051665][T15578] Mem-Info: [ 1188.069171][T15578] active_anon:477395 inactive_anon:24967 isolated_anon:633 [ 1188.069171][T15578] active_file:6393 inactive_file:15814 isolated_file:0 [ 1188.069171][T15578] unevictable:305 dirty:35 writeback:9 unstable:0 [ 1188.069171][T15578] slab_reclaimable:19120 slab_unreclaimable:151443 [ 1188.069171][T15578] mapped:58710 shmem:26019 pagetables:86084 bounce:0 [ 1188.069171][T15578] free:667002 free_pcp:1066 free_cma:0 [ 1188.251703][T15578] Node 0 active_anon:1413012kB inactive_anon:67372kB active_file:20kB inactive_file:4kB unevictable:1036kB isolated(anon):0kB isolated(file):0kB mapped:217440kB dirty:0kB writeback:0kB shmem:71388kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 976896kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1188.356524][T15578] Node 1 active_anon:498352kB inactive_anon:32492kB active_file:25564kB inactive_file:63264kB unevictable:184kB isolated(anon):1028kB isolated(file):0kB mapped:17408kB dirty:76kB writeback:12kB shmem:32652kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1188.475737][T15578] Node 0 DMA free:10280kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:1480kB inactive_anon:24kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:160kB pagetables:1068kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1188.583317][T15578] lowmem_reserve[]: 0 2514 2514 2514 2514 [ 1188.591325][T15578] Node 0 DMA32 free:89296kB min:87112kB low:96088kB high:105064kB reserved_highatomic:2048KB active_anon:1410132kB inactive_anon:67348kB active_file:20kB inactive_file:4kB unevictable:1036kB writepending:0kB present:3129332kB managed:2578004kB mlocked:1036kB kernel_stack:24292kB pagetables:56708kB bounce:0kB free_pcp:2764kB local_pcp:1408kB free_cma:0kB [ 1188.695365][T15578] lowmem_reserve[]: 0 0 0 0 0 [ 1188.702178][T15578] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1188.799238][T15578] lowmem_reserve[]: 0 0 0 0 0 [ 1188.820014][T15578] Node 1 Normal free:2570816kB min:53972kB low:67464kB high:80956kB reserved_highatomic:0KB active_anon:496152kB inactive_anon:32492kB active_file:25564kB inactive_file:63264kB unevictable:184kB writepending:88kB present:3932160kB managed:3870200kB mlocked:184kB kernel_stack:88108kB pagetables:286356kB bounce:0kB free_pcp:2800kB local_pcp:1300kB free_cma:0kB [ 1188.864950][T15578] lowmem_reserve[]: 0 0 0 0 0 [ 1188.874555][T15578] Node 0 DMA: 8*4kB (UME) 7*8kB (UME) 29*16kB (UM) 28*32kB (UME) 8*64kB (UME) 3*128kB (UME) 1*256kB (M) 1*512kB (E) 1*1024kB (E) 3*2048kB (ME) 0*4096kB = 10280kB [ 1188.897984][T15578] Node 0 DMA32: 1122*4kB (UME) 691*8kB (MEH) 969*16kB (UMEH) 530*32kB (UMEH) 82*64kB (UME) 93*128kB (UME) 47*256kB (ME) 18*512kB (UM) 8*1024kB (M) 0*2048kB 0*4096kB = 89072kB [ 1188.922662][T15578] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 1188.947299][T15578] Node 1 Normal: 896*4kB (UME) 302*8kB (UME) 322*16kB (UME) 448*32kB (UME) 757*64kB (UM) 665*128kB (UM) 421*256kB (UME) 211*512kB (UME) 63*1024kB (UME) 1*2048kB (M) 520*4096kB (M) = 2571344kB [ 1188.973322][T15578] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1188.986803][T15578] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1189.004414][T15578] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1189.024816][T15578] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1189.034386][T15578] 36901 total pagecache pages [ 1189.065496][T15578] 0 pages in swap cache [ 1189.069851][T15578] Swap cache stats: add 0, delete 0, find 0/0 [ 1189.075931][T15578] Free swap = 0kB [ 1189.105420][T15578] Total swap = 0kB [ 1189.109364][T15578] 1965979 pages RAM [ 1189.113190][T15578] 0 pages HighMem/MovableOnly [ 1189.117877][T15578] 349951 pages reserved [ 1189.143969][T15578] 0 pages cma reserved 20:27:05 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:27:05 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:27:05 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:27:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYRES16=r0], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000840)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x60}}]}}]}, 0x148}}, 0x0) r5 = socket(0x11, 0x800000003, 0x3) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000840)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x60}}]}}]}, 0x148}}, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000600)={&(0x7f0000000d40)=ANY=[@ANYBLOB="08030000", @ANYRES16=0x0, @ANYBLOB="040027bd7000fedbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="2802028040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000001000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e0000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004008000000008000600", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000900000044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b000000140004000700800500040000010001800900000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000700000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000050003000300000008000400010000803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="bc00028038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000400000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040005000000080007000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000000004008000600", @ANYRES32=r6, @ANYBLOB], 0x308}, 0x1, 0x0, 0x0, 0x880}, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:27:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000002000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:27:05 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1189.287366][T15643] BPF:Invalid magic 20:27:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000002400000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1189.313247][T15647] BPF:[2] Invalid name_offset:536870912 20:27:05 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:27:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x1dc5, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="4e8350006c5d65a97a3b46a7d9ecd6d23854c2838d57f5ded12bcb4d2017f58bdd47ee185abef38736ec14871be19c43f8eeb5ee17f22d8163594f760e65c5228da9167163dde9e97aedcbdc4e121c003e1c74c899df085b88ae68704920b812b6a717f547b7d4681aa46cdb", 0x6c, 0xbaa8}, {&(0x7f0000000200)="7ad91dc75d4e708891b5663a6b43f88d9cb5f4e70f66ece3373e094519c7709d1f73a945c416d52f843b284c85ad39caba5488277e17e21d469c8f9a5d5ee8a5b36abad9563a282065c875ab6218ea6bbf02b6c53bd9b21753953ded91a82f00e67a70aae8f2ecb0a7044041ac5aa56ee54b4d577bbe19adb532eb2f16c2917da1140ef35032d77240dc9ed98147332e710afff275356ff83f442f2a9439d13cd81f9cd9e6df945b63289bc9c5801f1d4cee90d57d2afc15aab01c2d62f5d729b4e858a6e9d398996761f0657d5305e21ca71c7d", 0xd4, 0x1e6a800000000}, {&(0x7f0000000300)="9f108a08eb21d1ee093f5d8f6a264a70223b26f74743d73f2ff0ddfea0dc6fc0d8ee8e5a0e77cc35d79d03c7ed964cd9175d64ece174ee82939489314970d7fa4559cad3fcb05ce58c96c3629bce03125bc2d1a396773d88940af2d21e3fe1427225fa4038c0fc37cf5a70c1c806d642f16ed97f37bfcfb98e75736e4b063665bf0ddbafdbfbd8403dc2fea95b907cfcaceb75ab6cc8a49c6105b47c6f536bd8fc1db705e1ca36d26b96d00aa0e6170ba434e93d", 0xb4, 0x1}], 0x204002a, &(0x7f0000000440)={[{@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x6}}, {@integrity='integrity'}, {@discard_size={'discard', 0x3d, 0x1}}, {@resize_size={'resize', 0x3d, 0x8000}}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x8}}], [{@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@appraise_type='appraise_type=imasig'}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x38, 0x66, 0x64, 0x38, 0x37, 0x30, 0x31], 0x2d, [0x64, 0x30, 0x63, 0x34], 0x2d, [0x30, 0x38, 0x66, 0x33], 0x2d, [0x30, 0x62, 0x62, 0x64], 0x2d, [0x52, 0x65, 0x32, 0x61, 0x35, 0x35, 0x30, 0x30]}}}, {@dont_measure='dont_measure'}, {@uid_lt={'uid<', r3}}]}) 20:27:05 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:27:05 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:27:06 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1189.820420][T15660] BPF: (anon) type_id=0 bits_offset=0 [ 1189.856763][T15662] BPF:[2] Invalid name_offset:603979776 [ 1189.897254][T15660] BPF: [ 1189.928955][T15660] BPF:Invalid type_id [ 1189.933827][T15670] BPF:[2] Invalid name_offset:603979776 [ 1189.970600][T15660] BPF: [ 1189.970600][T15660] 20:27:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000003004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:27:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000003000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:27:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x4142, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:27:06 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:27:06 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1190.463966][T15693] BPF: (anon) type_id=0 bits_offset=0 [ 1190.472660][T15692] BPF:[2] Invalid name_offset:805306368 [ 1190.507214][T15693] BPF: 20:27:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000003700000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1190.537386][T15693] BPF:Invalid type_id [ 1190.590665][T15693] BPF: [ 1190.590665][T15693] 20:27:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000003004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1190.679610][T15705] BPF: (anon) type_id=0 bits_offset=0 [ 1190.747761][T15705] BPF: [ 1190.781424][T15705] BPF:Invalid type_id [ 1190.834304][T15705] BPF: [ 1190.834304][T15705] 20:27:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000001000000000000000100000400"/56], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:27:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000003004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1190.947660][T15711] BPF:[2] Invalid name_offset:922746880 20:27:07 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1191.001930][T15714] BPF:[2] Invalid name_offset:922746880 20:27:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000003f00000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1191.085553][T15718] BPF:[2] Invalid kind:0 [ 1191.400757][T15732] BPF:[2] Invalid name_offset:1056964608 [ 1191.440252][T15734] BPF:[2] Invalid name_offset:1056964608 20:27:07 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:27:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) 20:27:07 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:27:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000004800000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:27:07 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:27:07 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1191.668709][T15740] BPF: (anon) type_id=0 bits_offset=0 [ 1191.712856][T15740] BPF: [ 1191.739614][T15745] BPF:[2] Invalid name_offset:1207959552 [ 1191.749072][T15740] BPF:Invalid type_id [ 1191.769140][T15752] BPF:[2] Invalid name_offset:1207959552 20:27:08 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1191.817761][T15740] BPF: [ 1191.817761][T15740] 20:27:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000004c00000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1191.890580][T15754] BPF: (anon) type_id=0 bits_offset=0 [ 1191.896617][T15754] BPF: [ 1191.917300][T15754] BPF:Invalid type_id [ 1191.983065][T15754] BPF: [ 1191.983065][T15754] 20:27:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x3, @multicast2}}, 0x1e) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:27:08 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1192.232895][T15764] BPF:[2] Invalid name_offset:1275068416 [ 1192.291868][T15768] BPF:[2] Invalid name_offset:1275068416 20:27:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000006000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:27:08 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1192.359548][T15773] BPF:Section overlap found [ 1192.649325][T15779] BPF:[2] Invalid name_offset:1610612736 20:27:08 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:27:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000000030000040300000000700000000000000000000f80398a485f573e703b900000000000000000000020100000000001f0001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x4, 0x0, &(0x7f0000000280)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r1, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r1}, 0x38) r2 = dup3(r1, 0xffffffffffffffff, 0x80000) openat$cgroup(r2, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000480)="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", 0x801, r3) keyctl$dh_compute(0x17, &(0x7f0000000040)={0x0, r4}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1d, 0x1000}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d72617720686173683d626c616b6532732d3235362d67656e657269630000000000000000000000000000000000000000000000000000000000007af588a42099e2484a1a537fa8707bfe0e2ea1aeb7e827d4bb95f4e99a009f2154471ddb83b713dd5440d501510eecb13b23268c9721843a1a061f233880177a3371f9f88308cc6f653f02e2377269f3c47646b42a1204874b458a0287fcdc23"], &(0x7f0000000340)="11ef505a308d4ddd6a9833d12b14fc5013ca04301a5086c89fe8f410c8", &(0x7f0000000840)=""/4096) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$llc_int(r6, 0x10c, 0x2, &(0x7f00000001c0)=0x7, 0x4) ioctl$sock_netdev_private(r0, 0x89fa, &(0x7f0000000140)="0fcf9838d0bc24b37a0e68473c55b12ba60141c4d1eea8bad06d302ba2f7e674bbce31eb23e78ef25544f8335be9f08b70fc34c81643b2e8e0410768a29de0080a410ef13e8edfc9a9fcc68d59097cfdc86b449f8d706bc528da3476b0e600a8cadf") 20:27:08 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:27:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000006800000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1192.733160][T15781] BPF:[2] Invalid name_offset:1610612736 20:27:09 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1192.815247][T15787] BPF:Total section length too long 20:27:09 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1192.992306][T15799] BPF:[2] Invalid name_offset:1744830464 20:27:09 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:27:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000006c00000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1193.038883][T15805] BPF:[2] Invalid name_offset:1744830464 [ 1193.224426][T15811] BPF:Total section length too long 20:27:09 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1193.342133][T15819] BPF:[2] Invalid name_offset:1811939328 [ 1193.400126][T15822] BPF:[2] Invalid name_offset:1811939328 20:27:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000007400000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:27:09 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1193.826525][T15831] BPF:[2] Invalid name_offset:1946157056 [ 1193.864474][T15833] BPF:[2] Invalid name_offset:1946157056 20:27:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000007a00000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:27:10 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:27:10 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:27:10 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:27:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="020028bd7000fcdbdf250300000006000b000300000014000600fe8000000000000000000000000000aa130001006272696467655f736c6176655f3000001400064800fe80000000000000000000000000002408000200000800ffffffff00"/104], 0x78}, 0x1, 0x0, 0x0, 0x24048800}, 0xc0884) sendmsg$NLBL_MGMT_C_REMOVEDEF(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r3, 0x20, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_MGMT_A_DOMAIN={0x9, 0x1, 'ext4\x00'}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x1}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast1}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @local}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @empty}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20004040}, 0x140) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) r4 = fsopen(&(0x7f0000000b40)='pipefs\x00', 0x0) fallocate(r4, 0x0, 0x800, 0x2) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:27:10 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1194.241228][T15843] BPF:[2] Invalid name_offset:2046820352 [ 1194.330170][T15851] BPF:[2] Invalid name_offset:2046820352 [ 1194.355523][T15854] BPF: (anon) type_id=0 bits_offset=0 20:27:10 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1194.406023][T15854] BPF: [ 1194.441126][T15854] BPF:Invalid type_id 20:27:10 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1194.474222][T15854] BPF: [ 1194.474222][T15854] 20:27:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000d100000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1194.611933][T15863] cgroup: fork rejected by pids controller in /system.slice/ssh.service [ 1194.657979][T15854] BPF: (anon) type_id=0 bits_offset=0 [ 1194.671638][T15854] BPF: 20:27:10 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1194.704313][T15854] BPF:Invalid type_id [ 1194.752076][T15854] BPF: [ 1194.752076][T15854] 20:27:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000200000000000001000000000000000100000441d27a8b098dfb0823c02559e0187612dc3138c00cbb28e408d717a5e146eae684d052843cc5ac5376b53f64900ea4c0b8fedcb218b9389f261683488ae47220218656c90af0b2dc5d91b3fc4ebeb88e45d6e86bbe8082e40a33f849bb910a09985f29bd59bc4b5c8f9b75c356876a6b5abf0569b58745e698f41d63536fe45efa32564ef24656467b716ade2bd54c0b4c01a29b22e98f8db4bf49ee7cda7d6d5a2260e72caf83ea4c14aa97cb1dd822d4"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:27:11 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1198.731046][T19944] FAULT_INJECTION: forcing a failure. [ 1198.731046][T19944] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1198.745153][T19944] CPU: 0 PID: 19944 Comm: syz-executor.3 Not tainted 5.7.0-rc6-next-20200522-syzkaller #0 [ 1198.755063][T19944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1198.765149][T19944] Call Trace: [ 1198.768460][T19944] dump_stack+0x18f/0x20d [ 1198.772799][T19944] should_fail.cold+0x5/0x14 [ 1198.777385][T19944] ? setup_fault_attr+0x1e0/0x1e0 [ 1198.782423][T19944] ? lock_acquire+0x1f2/0x8f0 [ 1198.787109][T19944] __alloc_pages_nodemask+0x17a/0x810 [ 1198.792490][T19944] ? lock_release+0x800/0x800 [ 1198.797182][T19944] ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640 [ 1198.803967][T19944] ? __unlock_page_memcg+0x4f/0xf0 [ 1198.809453][T19944] alloc_pages_current+0xff/0x200 [ 1198.814485][T19944] __get_free_pages+0x8/0x40 [ 1198.819171][T19944] __tlb_remove_page_size+0x26e/0x450 [ 1198.824555][T19944] unmap_page_range+0xefb/0x26d0 [ 1198.829516][T19944] ? unmap_vmas+0x12d/0x2f0 [ 1198.834022][T19944] ? vm_normal_page_pmd+0x330/0x330 [ 1198.839224][T19944] ? lock_downgrade+0x840/0x840 [ 1198.844072][T19944] ? save_stack+0x1b/0x40 [ 1198.848407][T19944] ? __kasan_slab_free+0xf7/0x140 [ 1198.853435][T19944] unmap_single_vma+0x196/0x300 [ 1198.858321][T19944] unmap_vmas+0x16f/0x2f0 [ 1198.862652][T19944] ? zap_vma_ptes+0x100/0x100 [ 1198.867351][T19944] exit_mmap+0x2b1/0x530 [ 1198.871600][T19944] ? __ia32_sys_munmap+0x80/0x80 [ 1198.876542][T19944] ? __khugepaged_exit+0x2d5/0x3f0 [ 1198.881678][T19944] ? kmem_cache_free+0x262/0x320 [ 1198.886622][T19944] ? __khugepaged_exit+0x2f6/0x3f0 [ 1198.891834][T19944] mmput+0x168/0x4b0 [ 1198.895799][T19944] do_exit+0xa7d/0x2e10 [ 1198.899991][T19944] ? find_held_lock+0x2d/0x110 [ 1198.904762][T19944] ? mm_update_next_owner+0x7a0/0x7a0 [ 1198.910165][T19944] ? lock_downgrade+0x840/0x840 [ 1198.915041][T19944] do_group_exit+0x125/0x340 [ 1198.919721][T19944] get_signal+0x47b/0x2510 [ 1198.924151][T19944] ? futex_exit_release+0x60/0x60 [ 1198.929248][T19944] do_signal+0x81/0x2240 [ 1198.933501][T19944] ? debug_smp_processor_id+0x2f/0x185 [ 1198.938967][T19944] ? copy_siginfo_to_user32+0xa0/0xa0 [ 1198.944349][T19944] ? __x64_sys_futex+0x380/0x4f0 [ 1198.949293][T19944] ? fput_many+0x2f/0x1a0 [ 1198.953633][T19944] ? exit_to_usermode_loop+0x36/0x360 [ 1198.959012][T19944] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 1198.965025][T19944] exit_to_usermode_loop+0x26c/0x360 [ 1198.970322][T19944] do_syscall_64+0x6b1/0x7d0 [ 1198.974976][T19944] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1198.980869][T19944] RIP: 0033:0x45ca29 [ 1198.984768][T19944] Code: Bad RIP value. [ 1198.988829][T19944] RSP: 002b:00007ffa9ddbccf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1198.997238][T19944] RAX: fffffffffffffe00 RBX: 000000000078bf08 RCX: 000000000045ca29 [ 1199.005215][T19944] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000078bf08 [ 1199.013201][T19944] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1199.021182][T19944] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000078bf0c [ 1199.029160][T19944] R13: 00007ffd2089f67f R14: 00007ffa9ddbd9c0 R15: 000000000078bf0c 20:27:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000008f019bc39e4b3000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x4, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8983, &(0x7f0000000040)={0x7, 'ip6erspan0\x00', {0x5}, 0x9}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000280)={0x2, 0x0, 0x1}) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690200ff3030b03a30303831302e300000000008008b004773db5cc2b528fe130c6f2e12fc5249e4e233f716aa38b28b5a7602ba", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB="488bcbc3b5d0a595cfb2eb7068cba8afbc1dd97b86a09d1a9880f70080930c8ff9820363e420b29556a139d3bba8c8fd6c633d6f2f2cd3c11d75d8bcc478a19e8c3bc87fc625b2394b00e8c334cc697cb1c0afcb942636826675e319a3dd7acffdf052c85b27ef234722484da4019466d910e9765fde799ccc821dc54a321224011b93b0dc7a6ee8382e592d0f301740f0000000000000716000"/166], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x480000, 0x0) ioctl$EVIOCSABS0(r5, 0x401845c0, &(0x7f0000000240)={0x3ff, 0xa, 0x9, 0x1f, 0x2, 0x4}) sched_getaffinity(r3, 0x8, &(0x7f0000000140)) 20:27:35 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:27:35 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, &(0x7f000026bfec), 0x0, 0x0) 20:27:35 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1219.480071][T15894] BPF:Total section length too long [ 1220.179633][T15897] BPF:Total section length too long 20:27:37 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:27:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004043000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:27:37 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, &(0x7f000026bfec), 0x0, 0x0) [ 1221.359472][T15930] BPF: (anon) type_id=0 bits_offset=0 [ 1221.387339][T15930] BPF: [ 1221.404351][T15930] BPF:Invalid type_id [ 1221.442080][T15930] BPF: [ 1221.442080][T15930] [ 1222.720007][ T5275] tipc: TX() has been purged, node left! [ 1226.434063][T15947] IPVS: ftp: loaded support on port[0] = 21 [ 1227.128945][T15947] chnl_net:caif_netlink_parms(): no params data found [ 1227.174007][T16014] IPVS: ftp: loaded support on port[0] = 21 [ 1227.260663][ T5275] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1227.283391][ T5275] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1227.328048][ T5275] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1227.355432][ T5275] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1227.375499][ T5275] device bridge_slave_1 left promiscuous mode [ 1227.381830][ T5275] bridge0: port 2(bridge_slave_1) entered disabled state [ 1227.436864][ T5275] device bridge_slave_0 left promiscuous mode [ 1227.443178][ T5275] bridge0: port 1(bridge_slave_0) entered disabled state [ 1227.522079][ T5275] device veth1_macvtap left promiscuous mode [ 1227.546889][ T5275] device veth0_macvtap left promiscuous mode [ 1227.553885][ T5275] device veth1_vlan left promiscuous mode [ 1227.576754][ T5275] device veth0_vlan left promiscuous mode [ 1238.812167][ T5275] device hsr_slave_0 left promiscuous mode [ 1238.880002][ T5275] device hsr_slave_1 left promiscuous mode [ 1239.098392][ T5275] team0 (unregistering): Port device team_slave_1 removed [ 1239.133723][ T5275] team0 (unregistering): Port device team_slave_0 removed [ 1239.159098][ T5275] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1239.234456][ T5275] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1239.473730][ T5275] bond0 (unregistering): Released all slaves [ 1239.711623][T15947] bridge0: port 1(bridge_slave_0) entered blocking state [ 1239.719218][T15947] bridge0: port 1(bridge_slave_0) entered disabled state [ 1239.742906][T15947] device bridge_slave_0 entered promiscuous mode [ 1239.755325][T15947] bridge0: port 2(bridge_slave_1) entered blocking state [ 1239.762618][T15947] bridge0: port 2(bridge_slave_1) entered disabled state [ 1239.772993][T15947] device bridge_slave_1 entered promiscuous mode [ 1239.871709][T15947] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1239.912349][T15947] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1240.161151][T15947] team0: Port device team_slave_0 added [ 1240.202317][T16014] chnl_net:caif_netlink_parms(): no params data found [ 1240.229113][T15947] team0: Port device team_slave_1 added [ 1240.318505][T15947] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1240.334118][T15947] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1240.394115][T15947] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1240.475452][T15947] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1240.482431][T15947] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1240.534296][T15947] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1240.760486][T15947] device hsr_slave_0 entered promiscuous mode [ 1240.863494][T15947] device hsr_slave_1 entered promiscuous mode [ 1241.017355][T16014] bridge0: port 1(bridge_slave_0) entered blocking state [ 1241.044185][T16014] bridge0: port 1(bridge_slave_0) entered disabled state [ 1241.052772][T16014] device bridge_slave_0 entered promiscuous mode [ 1241.105443][T16014] bridge0: port 2(bridge_slave_1) entered blocking state [ 1241.112997][T16014] bridge0: port 2(bridge_slave_1) entered disabled state [ 1241.135551][T16014] device bridge_slave_1 entered promiscuous mode [ 1241.251392][T16014] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1241.293352][T16014] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1241.379471][T16014] team0: Port device team_slave_0 added [ 1241.408552][T16014] team0: Port device team_slave_1 added [ 1241.515862][T16014] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1241.522860][T16014] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1241.583980][T16014] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1241.621506][T16014] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1241.634073][T16014] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1241.693975][T16014] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1241.831541][T16014] device hsr_slave_0 entered promiscuous mode [ 1241.884606][T16014] device hsr_slave_1 entered promiscuous mode [ 1241.923975][T16014] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1241.931658][T16014] Cannot create hsr debugfs directory [ 1242.315922][T15947] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1242.400920][T15914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1242.411159][T15914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1242.442428][T15947] 8021q: adding VLAN 0 to HW filter on device team0 [ 1242.472270][T15914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1242.495496][T15914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1242.506535][T15914] bridge0: port 1(bridge_slave_0) entered blocking state [ 1242.513637][T15914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1242.546426][T15914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1242.583165][T15914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1242.605223][T15914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1242.621044][T15914] bridge0: port 2(bridge_slave_1) entered blocking state [ 1242.628914][T15914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1242.695307][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1242.724068][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1242.769327][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1242.795465][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1242.835591][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1242.878830][T15912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1242.895592][T15912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1242.925653][T15912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1242.944760][T15912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1243.023137][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1243.047988][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1243.074881][T15947] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1243.110466][T16014] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1243.204925][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1243.216949][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1243.267527][T16014] 8021q: adding VLAN 0 to HW filter on device team0 [ 1243.311027][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1243.324569][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1243.366514][T15947] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1243.382879][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1243.393049][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1243.418559][ T2966] bridge0: port 1(bridge_slave_0) entered blocking state [ 1243.425898][ T2966] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1243.454223][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1243.493991][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1243.523047][ T2966] bridge0: port 2(bridge_slave_1) entered blocking state [ 1243.530451][ T2966] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1243.597010][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1243.606810][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1243.625306][ T2966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1243.667760][T24708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1243.679217][T24708] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1243.714905][T24708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1243.734804][T24708] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1243.784919][T24308] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1243.793509][T24308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1243.824908][T24308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1243.862476][T16014] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1243.895444][T16014] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1243.914491][T24711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1243.923331][T24711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1243.944702][T24711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1243.964061][T24711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1244.039799][T15912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1244.049841][T15912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1244.096321][T15947] device veth0_vlan entered promiscuous mode [ 1244.114600][T15912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1244.141330][T15912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1244.197675][T15947] device veth1_vlan entered promiscuous mode [ 1244.237319][T16014] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1244.250524][T15914] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1244.268532][T15914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1244.300419][T15914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1244.425340][T15912] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1244.454278][T15912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1244.464668][T15912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1244.491836][T15947] device veth0_macvtap entered promiscuous mode [ 1244.533168][T15947] device veth1_macvtap entered promiscuous mode [ 1244.575557][T15912] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1244.605040][T15912] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1244.613490][T15912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1244.645123][T15912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1244.721429][T15947] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1244.756738][T15947] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1244.783654][T15947] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1244.814007][T15947] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1244.833627][T15947] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1244.853656][T15947] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1244.873802][T15947] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1244.903646][T15947] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1244.925995][T15947] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1244.943603][T15947] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1244.966081][T15947] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1244.982404][T16014] device veth0_vlan entered promiscuous mode [ 1245.015334][T15914] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1245.035497][T15914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1245.054756][T15914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1245.073732][T15914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1245.092943][T15947] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1245.131409][T15947] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1245.153576][T15947] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1245.183617][T15947] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1245.203615][T15947] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1245.223583][T15947] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1245.233472][T15947] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1245.246246][T15947] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1245.256612][T15947] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1245.267555][T15947] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1245.281300][T15947] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1245.298400][T15912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1245.307974][T15912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1245.316755][T15912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1245.345253][T15912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1245.377867][T16014] device veth1_vlan entered promiscuous mode [ 1245.656606][T24308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1245.674719][T24308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1245.706749][T16014] device veth0_macvtap entered promiscuous mode [ 1245.737626][T16014] device veth1_macvtap entered promiscuous mode [ 1245.773819][T16401] BPF:[2] Invalid name_offset:3506438144 [ 1245.877262][T16014] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1245.928183][T16014] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1245.965631][T16014] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1246.003578][T16014] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1246.034052][T16014] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1246.073519][T16014] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1246.093498][T16014] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1246.113476][T16014] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1246.123381][T16014] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1246.163685][T16014] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1246.183688][T16014] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1246.203594][T16014] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1246.227053][T16014] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1246.278634][T24315] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1246.302977][T24315] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1246.342486][T24315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1246.382423][T24315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1246.426457][T16014] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1246.453456][T16014] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1246.463374][T16014] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1246.533481][T16014] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1246.561159][T16014] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1246.591419][T16014] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1246.621420][T16014] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1246.643459][T16014] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1246.663451][T16014] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1246.703522][T16014] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1246.714846][T16014] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1246.743450][T16014] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1246.766766][T16014] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1246.783756][T24315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1246.793072][T24315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 20:28:03 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:28:03 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, &(0x7f000026bfec), 0x0, 0x0) 20:28:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000140)={0x14, 0xf, 0xf, 0x18, 0xb, 0xffff, 0x2, 0x20, 0xffffffffffffffff}) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000180)={0x1, 0x8}, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000006d04daec1efa0bf500000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000ffff0f000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:03 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:28:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004043000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1247.271715][T16420] BPF:[2] Invalid name_offset:4294901760 20:28:03 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, &(0x7f00000000c0), &(0x7f000026bfec), 0x0, 0x0) 20:28:03 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1247.328498][T16426] BPF: (anon) type_id=0 bits_offset=0 20:28:03 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1247.431590][T16427] BPF:[1] Invalid btf_info:bfa1eec [ 1247.465344][T16426] BPF: [ 1247.501734][T16426] BPF:Invalid type_id 20:28:03 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, &(0x7f00000000c0), &(0x7f000026bfec), 0x0, 0x0) [ 1247.562964][T16426] BPF: [ 1247.562964][T16426] 20:28:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004043000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=@newtaction={0x14, 0x26, 0x727}, 0x14}}, 0x0) 20:28:04 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1247.825648][T16451] BPF: (anon) type_id=0 bits_offset=0 20:28:04 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, &(0x7f00000000c0), &(0x7f000026bfec), 0x0, 0x0) [ 1247.871153][T16451] BPF: [ 1247.906408][T16451] BPF:Invalid type_id 20:28:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=@newtaction={0x14, 0x26, 0x727}, 0x14}}, 0x0) [ 1247.958107][T16451] BPF: [ 1247.958107][T16451] 20:28:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000040004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1248.118941][T16462] BPF:[1] Invalid btf_info:bfa1eec [ 1248.222426][T16467] BPF: (anon) type_id=0 bits_offset=0 [ 1248.297142][T16467] BPF: [ 1248.322280][T16467] BPF:Invalid type_id [ 1248.343469][T16467] BPF: [ 1248.343469][T16467] 20:28:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) 20:28:04 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:28:04 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], 0x0, 0x0, 0x0) 20:28:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=@newtaction={0x14, 0x26, 0x727}, 0x14}}, 0x0) 20:28:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000ffffff000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000040004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1248.608572][T16485] BPF: (anon) type_id=0 bits_offset=0 [ 1248.641793][T16484] BPF:[2] Invalid name_offset:4294901760 20:28:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000001000000010000000100003f004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1248.657300][T16485] BPF: [ 1248.676474][T16485] BPF:Invalid type_id [ 1248.677632][T16493] BPF:[2] Invalid name_offset:4294901760 20:28:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000001000000010000000100003f004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000010002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:04 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], 0x0, 0x0, 0x0) [ 1248.724168][T16492] BPF: (anon) type_id=0 bits_offset=0 [ 1248.733425][T16485] BPF: [ 1248.733425][T16485] 20:28:05 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1248.837270][T16492] BPF: 20:28:05 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1248.861775][T16492] BPF:Invalid type_id [ 1248.918560][T16492] BPF: [ 1248.918560][T16492] [ 1248.977537][T16505] BPF: (anon) type_id=0 bits_offset=0 [ 1249.008802][T16507] BPF:[2] PTR (anon) [ 1249.030148][T16505] BPF: [ 1249.042085][T16507] BPF:type_id=1 [ 1249.054486][T16505] BPF:Invalid type_id [ 1249.091412][T16505] BPF: [ 1249.091412][T16505] [ 1249.093398][T16516] BPF:[2] PTR (anon) [ 1249.101380][T16507] BPF: [ 1249.137981][T16516] BPF:type_id=1 [ 1249.143876][T16507] BPF:vlen != 0 [ 1249.198976][T16516] BPF: [ 1249.206815][T16507] BPF: [ 1249.206815][T16507] [ 1249.241046][T16516] BPF:vlen != 0 20:28:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$rose(r1, 0x104, 0x1, &(0x7f0000000040), &(0x7f0000000140)=0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:05 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) 20:28:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000001000000010000000100003f004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:05 executing program 4: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], 0x0, 0x0, 0x0) 20:28:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000020002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1249.303569][T16516] BPF: [ 1249.303569][T16516] 20:28:05 executing program 5: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], 0x0, 0x0, 0x0) 20:28:05 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], 0x0, 0x0, 0x0) 20:28:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1], 0x7c}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:05 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 1249.542464][T16539] BPF:[2] PTR (anon) [ 1249.551065][T16536] BPF: (anon) type_id=0 bits_offset=0 [ 1249.594488][T16539] BPF:type_id=1 [ 1249.613633][T16536] BPF: [ 1249.626447][T16539] BPF: [ 1249.631569][T16536] BPF:Invalid type_id 20:28:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1249.666879][T16551] BPF:[2] PTR (anon) [ 1249.671170][T16539] BPF:vlen != 0 [ 1249.683579][T16536] BPF: [ 1249.683579][T16536] [ 1249.700644][T16549] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1249.715759][T16539] BPF: [ 1249.715759][T16539] [ 1249.719184][T16551] BPF:type_id=1 [ 1249.753187][T16551] BPF: [ 1249.759900][T16551] BPF:vlen != 0 20:28:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000030002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1249.780695][T16551] BPF: [ 1249.780695][T16551] [ 1249.780831][T16549] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.4'. 20:28:06 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], 0x0, 0x0, 0x0) [ 1250.014540][T16566] BPF:[2] PTR (anon) [ 1250.039378][T16566] BPF:type_id=1 [ 1250.066066][T16566] BPF: [ 1250.069122][T16566] BPF:vlen != 0 [ 1250.072937][T16566] BPF: [ 1250.072937][T16566] [ 1250.483275][T16547] BPF: (anon) type_id=0 bits_offset=0 [ 1250.488766][T16547] BPF: [ 1250.491542][T16547] BPF:Invalid type_id [ 1250.503628][T16547] BPF: [ 1250.503628][T16547] 20:28:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000300004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:06 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, &(0x7f000026bfec), 0x0, 0x0) 20:28:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000007040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000040002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:06 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], 0x0, 0x0, 0x0) 20:28:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r2, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x38) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f00000001c0)={r6}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000001c0)={r6, 0xfffffffb}, 0x8) r7 = fcntl$dupfd(r0, 0x406, r2) ioctl$KVM_ASSIGN_DEV_IRQ(r7, 0x4040ae70, &(0x7f0000000180)={0x1, 0x1, 0xfffffffb, 0x5}) r8 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SG_NEXT_CMD_LEN(r8, 0x2283, &(0x7f0000000040)=0x55) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040093aacc4f12a400000000000000000002010000000000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1250.701316][T16583] BPF:[1] FWD (anon) [ 1250.717139][T16585] BPF:[2] PTR (anon) [ 1250.740567][T16588] BPF: (anon) type_id=0 bits_offset=0 20:28:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1250.759522][T16583] BPF:struct [ 1250.761567][T16585] BPF:type_id=1 [ 1250.772720][T16585] BPF: [ 1250.784116][T16588] BPF: [ 1250.787318][T16583] BPF: [ 1250.790567][T16585] BPF:vlen != 0 [ 1250.802499][T16588] BPF:Invalid type_id 20:28:07 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, &(0x7f000026bfec), 0x0, 0x0) [ 1250.831790][T16583] BPF:type != 0 [ 1250.845127][T16585] BPF: [ 1250.845127][T16585] [ 1250.850675][T16597] BPF:[2] PTR (anon) [ 1250.861768][T16599] BPF:[2] Invalid kind:0 [ 1250.868398][T16588] BPF: [ 1250.868398][T16588] [ 1250.877056][T16583] BPF: [ 1250.877056][T16583] 20:28:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000007040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1250.887481][T16597] BPF:type_id=1 [ 1250.909069][T16597] BPF: [ 1250.954430][T16597] BPF:vlen != 0 [ 1251.007011][T16597] BPF: [ 1251.007011][T16597] 20:28:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000050002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000005040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1251.108092][T16608] BPF:[1] FWD (anon) [ 1251.119891][T16606] BPF:[2] Invalid kind:0 20:28:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r0, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690200ff3030b03a30303831302e300000000008008b004773db5cc2b528fe130c6f2e12fc5249e4e233f716aa38b28b5a7602ba", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r1, @ANYBLOB="488bcbc3b5d0a595cfb2eb7068cba8afbc1dd97b86a09d1a9880f70080930c8ff9820363e420b29556a139d3bba8c8fd6c633d6f2f2cd3c11d75d8bcc478a19e8c3bc87fc625b2394b00e8c334cc697cb1c0afcb942636826675e319a3dd7acffdf052c85b27ef234722484da4019466d910e9765fde799ccc821dc54a321224011b93b0dc7a6ee8382e592d0f301740f0000000000000716000"/166], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x2, 0xa7, 0x0, 0x1, 0x0, 0x9, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040)}, 0x8, 0x5, 0x9, 0x9, 0x3, 0x3f, 0x766e}, r1, 0x9, r3, 0xa) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_open_dev$vivid(&(0x7f0000000240)='/dev/video#\x00', 0x1, 0x2) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1251.162252][T16608] BPF:struct 20:28:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1251.210151][T16608] BPF: [ 1251.233483][T16608] BPF:type != 0 [ 1251.256259][T16617] BPF:[2] PTR (anon) [ 1251.262648][T16608] BPF: [ 1251.262648][T16608] 20:28:07 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, &(0x7f000026bfec), 0x0, 0x0) 20:28:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000007040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1251.297183][T16619] BPF: (anon) type_id=0 bits_offset=0 [ 1251.301155][T16617] BPF:type_id=1 [ 1251.351907][T16625] BPF:[2] PTR (anon) [ 1251.356741][T16617] BPF: [ 1251.362799][T16619] BPF: [ 1251.377267][T16617] BPF:vlen != 0 [ 1251.388819][T16625] BPF:type_id=1 [ 1251.396233][T16619] BPF:Invalid type_id 20:28:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1251.407915][T16627] BPF: (anon) type_id=0 bits_offset=0 [ 1251.414381][T16617] BPF: [ 1251.414381][T16617] 20:28:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r2, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x38) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f00000001c0)={r6}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000001c0)={r6, 0xfffffffb}, 0x8) r7 = fcntl$dupfd(r0, 0x406, r2) ioctl$KVM_ASSIGN_DEV_IRQ(r7, 0x4040ae70, &(0x7f0000000180)={0x1, 0x1, 0xfffffffb, 0x5}) r8 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SG_NEXT_CMD_LEN(r8, 0x2283, &(0x7f0000000040)=0x55) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040093aacc4f12a400000000000000000002010000000000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1251.448697][T16625] BPF: [ 1251.456316][T16619] BPF: [ 1251.456316][T16619] [ 1251.473446][T16625] BPF:vlen != 0 [ 1251.489455][T16627] BPF: 20:28:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000060002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1251.525561][T16625] BPF: [ 1251.525561][T16625] [ 1251.535189][T16627] BPF:Invalid type_id [ 1251.558027][T16641] BPF:[1] FWD (anon) [ 1251.566628][T16627] BPF: [ 1251.566628][T16627] [ 1251.627775][T16641] BPF:struct [ 1251.652316][T16641] BPF: [ 1251.667731][T16641] BPF:type != 0 20:28:07 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, &(0x7f00000000c0), &(0x7f000026bfec), 0x0, 0x0) 20:28:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r2, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x38) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f00000001c0)={r6}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000001c0)={r6, 0xfffffffb}, 0x8) r7 = fcntl$dupfd(r0, 0x406, r2) ioctl$KVM_ASSIGN_DEV_IRQ(r7, 0x4040ae70, &(0x7f0000000180)={0x1, 0x1, 0xfffffffb, 0x5}) r8 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SG_NEXT_CMD_LEN(r8, 0x2283, &(0x7f0000000040)=0x55) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040093aacc4f12a400000000000000000002010000000000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1251.692646][T16641] BPF: [ 1251.692646][T16641] 20:28:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000007040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1251.780385][T16648] BPF:[2] Invalid kind:0 20:28:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0xd4ce8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000140)=0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000073600000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000180)='./file0\x00', &(0x7f0000000640)='trusted.overlay.redirect\x00', &(0x7f0000000680)='./file0\x00', 0x8, 0x0) socket$inet(0x2, 0x5, 0x9) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x3fc, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x1}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) vmsplice(r0, &(0x7f00000005c0)=[{&(0x7f0000000180)}, {&(0x7f00000001c0)="1847f066ffd39b5295d2c9a7262bc30e77054464cc991106528a35587df52d4a4907a5620cb2ca9e52b8788d164df358bc366d1d3e274735d01c8ba895ebf658e2d7feba87aad54ab293f0fb69d430ea32f8e93c64a41a8e9356d28ea48448279977194f073dbfa12a55633d8c9ec1987417d83121615779b8125aff1cb3c357eda0f7e8d721fbe643e78f3dc8a0ca6638c757745f2748fef90ef7e2df5060a1c138495f3838c4305135382c3d02b10344220e4d7404913334bacf77cbcc9754b3e853f2b16fe64db7b9e87b2300c7366625e7c7fcc263cb1d19b1b4f7dbc49b627aab73f2a36a", 0xe7}, {&(0x7f00000002c0)="1350883ce9c99672743fc52d674c558cf0db14f8c667f0b84566edab9880ad5a7e171f388370e5bbbed159485a25ab10934a42764ab3e9c14d2141e5457eb9d87b3992fea06aabce5e814b0d81d183a502d0d493849a94ff710e4745dbfc844d7bbef8406b0c41fb9a28061a19bac09cc52227fa32c08a46549b47e63f6617a6c85ae692cf863a0a400fac323c4d0f1eed31c581d66d383adfa0c1bdcc6379ae65c7e2ff2a1baca22d59b95f8da7352795f319fd9f9f731ac3faa6c764c17c73f6e0", 0xc2}, {&(0x7f00000003c0)="0a4911bd3985800b39a046cc9917caea8299cc4d37c6f83a27de8e1a7b071f12692ae9542cfe9e7cba5a21ad1fb26eb8979556d75dddce44855178065328b005856345070a5fd5b5fda8fd995e2fb1054654edcaf90fd3778305db30dc1ab19456f8574b0a6b3215fb0905aa047012a736ade5d7af0dcae66917de7340c7c8318e4c0e61482d1a1657debd0953575776ec25786a12aed9ebfb4bc03d2367f82ccf58e03901ddb488cdcdc5dcf6bbe928845431619afca26dae8c8a44ec4eea09aac6ceaa203458ec92f04cfe454f13dd188de06c4c", 0xd5}, {&(0x7f00000004c0)="8e0687ab037eb9d992a3a6571dc809f39c7f0557fbb2d8570cf2aa5db5048fa93f3a2623fec749e8d2975c56289ec055f8184f029b6451196f816261c4764522368f03835937d9635f9971fe6f991e71f239398e372fcb76ff0922d12c4dfa84bfa2ea5e76c07dd4f05eedcb378425cc3e94495ae6a38851c7bdada4404224050732e129d661e0b54968633b3ffda007ab3ed453fca9b106483f4c4afc795180ccb4f180ce0437480e5c95add37170960482c9936b1c8c639308f88254eb9862b519f20d919040200d5f99b82f3f1626", 0xd0}, {&(0x7f0000000d40)="9b511c2e601d889e4726ac753436274cddfc2e3f5a0e3f1303bbe257c718bf20d48662989df26c13efeb0579d6a66a6c869144f07e88e7eb61b85a4349533308587f9702546d9115b49f62a30577eafac34f3b1ee598078dd363d01d496adc00484af8fa0a7218ebf89d0fde276d9ee0a9e82e33d75479c1720ef7b29331547c3549db0d469b997812c02c6681eba19e00703759e723a2377b8b8bdaa2bae638de7873601c470a22e771fee8e749b18b2963d879939ad87be62ac04e5ea54dfe7a40a04c624e16b69a023837c7e63a594f5b1bbb1b30329478489bf50cdbee6211333cbdcede6534f28ba1b6f5e87c891cbb1b2211c6d81002e229a1950bb2b2513d42958775fb2a92c703b69a2b1cb718b602b0855974d3a8b259c1713e3bd2504d0ed67508f416c21085c9c0def633619c4e9327e901ce5b1d051cd0b56373c0dde9bbdda30051fe0f91453e9413702bc078c4d1ac4ecb169154eb70d23dc7f17f3964a23aca6927d0053dccd6f420ec973401a4d140c30c2cf6fc7018ba9c25f9fb0b4c6534e60e3485c74099b80080b303b4a0ea42f195dac9200201f0f899b3488f66d9ceffed801a3519dce00a36a5c25c33b4a4614a863154e0ff98b3268eb4f1e915fd39405c70e385eda9d158b11903abfcc015253320aa2a011fc8917e2692bb245204c0c54320b5afc64cd8d1b010ad2dcb306b76b06ef48a32d76fc0446ce9cf747c5045062ea8c7ecdc89b21ef8dff0d8376a90680b62d8ff6fb3c16808f9c5a5bed02204d98e262fbba0558557e4d29da1ea34801ccd43a88a9e7d29b2272fe1832247b568d1eaa87104501e0ac83d3db8813d25b786c6d1afc147eed9e15a4b95f1c3078921981f1bc320be9473e14ecd240a27cc558cf6c9a74f2fd1f410e430ae12a6cca2db84402e6aea7a933351959e6878ce1b74a2118017b557223200f690f87ecf98edfbb448d5d12e286e67a162bd9d649ff6dd29542fa0ccce4ca09cff596459c27fdf429b54c28c4662d77047370e0315d96ade1b33bf609f4574d2d55299a195cba02039c8d80db55e5cce8f4b9fe5da9be7a4c44c32cc58b84fb3a16a5f97b8a6155c3a473ad807c24a5aa7119465d3f6c6661c29fe8146f6a67339a2c830f19d324fcacf7d83382b591e076b1711b57d8840eedd1254354906902c8cea76044accc546b9a03a790040e4654be84b73849df9ae47e6a580c367d08085f3c0e2a27ee966c4f87432562df3474a8578c75c6b6f69d2f7349d67f810dda9d3e8ab4cbf5865f6e257bbf5de3f4eb42f7782064e451e1725c81e94844fa530aeb7632fe4ced1f9dc870470fd1688e5e3efa2d5b4ed33823a7369f2d78f7267fa6a3a9417cac08931449d0f0facc9f556d5717c1b053b975f0ef17a49e5a5cdff4f9ccddaeb911ee85f4ae1360aad9e729ca286c43ad382573fe7835d494eaa81b9c2bba51d4a87a86580fd1a9a39d3bf4097515a3beaee3923ed05fb8ab717f519537cc71e18362daa7d060bcba7594df2311165c3cef16139a88b2f19e34b8bccc07bc960129eeec08100797207ddfadf0036213c858a268909ed7d90296c799012606026accc3fc69558fad160e8905699e21231abcecdf23ad715fe154c24149ff7180cc4ee29db063a09e3445dc5a12b53d65dd58ea80a879c790087041d01622a7753953d21ed055b4d068ccbe7347d34dfa615c0d2bde14f05eeda906e0488c1f1780df216ad55b7bffb99993450f6315dbe19f05b2655823fbebf6fc2f8b0f6bd4a6f2612f3424210e84e1d9c1ac33edf5a0347760a914ad8c7022c6d0a899e3a0c0fa5b07fad4e25c006eb0f20b0a0e4fa4dea5377b1209a19f49e2c81bf7693f68fad7a7f86c47543c1c61a0af3be5ae352d796cdeff1d9e01e41fbe2bed1319f8ba7fe16970459bf6583316668a7208ead456b4679d1b31bdc6675b38615925b83c0622e4b544724a2bed14c87d8c67d50ab4d86bc3ccc3474281982f3cb32dd002952051d93f51d6a2d5dd991273806e9d7435f250dcb356f2fd4caebf8181d1775c9210ac780de4c6f4f9185ff24259b7ce2a1b16c2ccd8b808bcad7fc1e456a0e3404130f434d395f093661f4305a4a0527b4144ec89da56c81df9db589c3b4fc48161c34c28e72eee744feff3bdc6195ee3088c791b518fcd5004aa80db054dfcf7b7b8f6161ace61c0fe03e8c6e8e4a181a7284dd9728015549b5c76aa5837f2ff186c0cd630e4a739dfedb7ccf8defbc6cfacfaa1a11c015b7d8cda9ec023a37e1af25fc867f91dd9d68820b0421e3e6e59af54ea76ae73df3210ec56a1556aaec43936bedee9ba70c04e0507d4abde3503447deff3b97d725c94ef7deb37e55ca8dc808738dc11b4a93598e00ce6262fa914dadd968f6fa1d555b884aa5d897c45f9f7fd2136a0fd4010c349ea73effd30e8758aa4bc50061f1e626d1f2db4278faac3e8db61cd624ade92dca1437006edc290e58995e74a82d7900f54974e02def1d320cfb6b0dad3373135f525d06cfb3953549928fef496f7552d1198383f38cd5cd1e8000315335294e2270269db1cb807d3cf21beba5d1d1b69960a5f76ed1318077315c514b7a12868396dfa58574c67e8cd3d0422394bb25ecf59fe3feae0ab8f938aedbd9f6b728ac347945c92c88ecfeb3ec9b673ca38e1ba9d2639334c0b554937907ee940509125569cd5c0dddac608b1b1d678397d6e02bc43d6915a98ba0c556a2cbe3243249b64a4b45bc66a826b489a4d91cc4f81aa8cd79faffea0d135d995c62c575e9358f101e109613ba5c39891d95e99367b75e0a6d4a2756abfb681d128739b763767c3f61ffb5c6e0b3b6cf9ecaefdfc72ef4663d1e02d2467886f63805d06580eacc8cd3063bba53a13ccf35f9a54b902bd41c7e1196347481b8e1207549949bee4dfc253560b8a3599f0bca084f536eb931a52bb1c10eceb79cfb514c99012c019e88590cbd99cf25e4b33cee0104d63a80def5c1b93655f17bba154122cf988781e3d06bc540bfd0f60eae258103677c8c03f4c0588ee999e5cffc7ca6c8111d65c2ecd5181257de55e8c2bdb5feab8d92845b541dda41baaafeb91b42ff6664d0e7303739bfc49c61db0d7a988c103484ee2cfa6ab8ed28b792260d5c28c91afe8eb313ef4d9177fa9a8d7d718ae0ff8b3afc62a30200a9f8e09621753a11b175415aa1920656e7924042dcd6319617f4d20aeec7bd3a6e74d11a31237ee095905761ce6cb0abae6e80148d6058b025c2635133a5ba8c670c4ba43605d9e93869d4ef8d98efdfbf46b943125b6f658dc98f751fe19e455975762f78f27d1e83f1321407dacf67681510a47fc69af775757fb6482aefa6ca91f2606f621463299786ada956ee80e7816a0484b775a0b10a04d65c40935f40d02761e34ed026d8a329b4c041d6cadbb4d174cd4e5c6272c35d31bd079989893ba7343dd03b82416c370ad01b9c67158bed224dd768eb5c04b3e6df42f1b9fd4a3db40431c13944adcab7598357b7a01453fa63b0eb4372ec6122e7d4a5a224f1028821837a9d35695997094050628cc4154719b94c1b3c76b2ab704a1da71b3d340b2500087b4d623f17c75570e4eff719ab36f51b9988630a5161b979c30848cbe3d9034a8d4036e174e7466017c5f029e08eca6d914843d61f17e444ea47dd59407cc9bee5e1cd2a8e2ae6c151fb2914401f58b9ab12ea2f5017d92048ee5e4d1674e54684c3014986f1027e91e29ac6eb05bbf3403845169744ddcb7039c9a2df4d185263eead2f3a3714e3ecff4b9b30b137bd8a577dceda75cf108e66d7061e0dcf7a5e01fa1d6aef57d6bf6e3c77953642a676021f61f9c306708ee2d0a02f451d6ff06d3fd41eac2001c2af0bf9623607993ec548a28b10e76cf19d6f11d0a02bc108a935d9363afa2b83f80db4bf3e202e072fbac5aeb5e4820a0d8a7d318a1920b1eb24a7e9e52f0fba09f64bafa4b2113c003b8e3a828042989c811e26075ebe359717161e41af4af1bea3d6485564e34a197b324418e9470910a5864b56c8dc1e068a9e78b11e3a2b7c881f3516ae60d5d9b4d81955e72130c6cd4345649e384f3c694bfdbcc785cfb66e73db77cc966b4727527c2bac8fe69d2e3efdf0dea42ca90c35a33033bc8ab7f20cb43bbc7ee02c7d224f1bd65a3d62767b13222e56407b8a92d6b4453678a3777c86e4a8c6efd481b06595defda150609ce7f84ba5cf0e89cd0a4fb286580f4dd425e6bbbd20fb7216315f3f7f4192d76ddcb1062e71e1effd62cde7b148a66ee4df1efc8e33cc0767973ed484b4bf9f42f28f79a2707367c495ca514c9796fbadcb08f3057cb69e0a872bd7e90c0446ab50e065eb56e9caf3e7beda37e2adf07c81d6f2a23122f839fef2e6526fe2c12cf8ccd00119b473133c84684cd3ce25eda004a3e41995b8350ec3cfc65569b19345361f29ad3719cba06ec5cc1027df787a3b7f37c1b246bbadb6368b8e1881524ddec25ad7a1299c39c38cc354d7c60eccc85d6fed6f802b4d88741d04671032897ef9a15fae570b4c36dd28566676b79b6cdcda692aaadaa9b0d58d25d7f18df06c2b2d8af01d07a168146fe03b174ba1a2eb8bde15242111e81a22bf21b22c223e391fabce2bac4d45432c7f8d2e071f146f9186efb0c97331dd751820ac8cf2ae995b8f2de97256ee1493f2f13635783436f0a58fd560889c3adf2e67372af3e877e373bc8abdb6a72d999818fea9e15879a4b09e8c5604ce2bcbd552bec01cad97fb4b67fb2f74f81d6a4a7d96816a18fad731d37921c82106735a5e4c5778ba2554d03d3da21b3ed289cf4cb56138f7475b29e9c6544e20b15e689245057fd8fab5cfd8c864fc5c01284a31efcaa7b1c10c7452d46db4230a96d3fa5d126595a47c76770df8dd6cc2a09a8c87464937decf7b1486716134570dee23aabc1b39a42b16d376a8977036a544944acc04bd029674b2439a334df7fa0d0e79153c80471834ea4bc85144a5a5dab22d6667debc194b29f07ac724a0808ff508422a4d6ab00c1081877eb86855188f9d33719a75892f11dd4f0734ecb5e3528d1e2ec3d906fe2e5ce0af3a2393ef7b3b5d10afa598dee5d2bb1cf6276f2c6f86da5be886eb869f9bee23eb80747143369ddf193bcbc753ce926d487cd229eabf8911e4bb6b4b98980eeb196d9e09550c175f6cc0a10a6f47c4cdf227df8e16f706419de29e45f4ddad122858940b580ec7dc727a2cd7c712c656e3af710a0b5de79678b2dbc0e86511f11c70de64f9e7fe160879bd122ead1bbbac32180a4c20cc7c68618c0795df26e027016734ce9b24f79b7066dd5d8e245fcdfcc4bec6e697aac618da389d4e7d5dbf114bd1d41d46dd9af03487b5169851c661a90deae4b6e561801cc7a3353db0a54cf6e706aca3ae0628d3dab7ea2b3854458d2d091c8d9f9cc7ff794c187eb71ca4ccf1fa9e2fc01a4fb71c23506ec8ca5de2b4a1a85d9b49ce5166099220015f23a6fc5b76a5efca790cda37690f1f016098941ed0294c7974cbf8b0c5248082db6fc3602038bd47d460fa21f820aa26f99c05407fffffd74f335d952cfe6cfb8cbff88cc0d95ebb42933dd14ae17c3ef42de6c9192a74746dc693d3f786bf744ef9eea18dc800914fe3ae3a0a2d33f88fca3cb05160b93c5d4afb4fd0c8598e360265c0ad58c3c4c48a76cdea2d47918569fa7ad41bfcf2503f3ea6c28b8161f646f6ad908e496cd38d2c0d0b02a06855e5462fe682db821666ab95", 0x1000}], 0x6, 0x1) [ 1251.803522][T16651] BPF:[2] PTR (anon) 20:28:08 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, &(0x7f00000000c0), &(0x7f000026bfec), 0x0, 0x0) [ 1251.833776][T16651] BPF:type_id=1 [ 1251.876606][T16651] BPF: [ 1251.912198][T16651] BPF:vlen != 0 [ 1251.915685][T16660] BPF:[2] PTR (anon) [ 1251.957147][T16660] BPF:type_id=1 [ 1251.958275][T16651] BPF: [ 1251.958275][T16651] [ 1251.968912][T16664] BPF:[1] FWD (anon) [ 1251.980082][T16660] BPF: [ 1251.993124][T16669] BPF:Total section length too long [ 1251.999083][T16660] BPF:vlen != 0 [ 1252.007691][T16660] BPF: [ 1252.007691][T16660] [ 1252.031338][T16664] BPF:struct 20:28:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000070002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r2, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x38) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f00000001c0)={r6}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000001c0)={r6, 0xfffffffb}, 0x8) r7 = fcntl$dupfd(r0, 0x406, r2) ioctl$KVM_ASSIGN_DEV_IRQ(r7, 0x4040ae70, &(0x7f0000000180)={0x1, 0x1, 0xfffffffb, 0x5}) r8 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SG_NEXT_CMD_LEN(r8, 0x2283, &(0x7f0000000040)=0x55) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040093aacc4f12a400000000000000000002010000000000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1252.099252][T16664] BPF: [ 1252.116366][T16664] BPF:type != 0 [ 1252.140710][T16664] BPF: [ 1252.140710][T16664] 20:28:08 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, &(0x7f00000000c0), &(0x7f000026bfec), 0x0, 0x0) 20:28:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000007040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1252.274208][T16679] BPF:[2] PTR (anon) [ 1252.300826][T16679] BPF:type_id=1 [ 1252.335248][T16679] BPF: [ 1252.342745][T16686] BPF:[2] PTR (anon) [ 1252.347613][T16679] BPF:vlen != 0 [ 1252.369879][T16679] BPF: [ 1252.369879][T16679] 20:28:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r2, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x38) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f00000001c0)={r6}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000001c0)={r6, 0xfffffffb}, 0x8) r7 = fcntl$dupfd(r0, 0x406, r2) ioctl$KVM_ASSIGN_DEV_IRQ(r7, 0x4040ae70, &(0x7f0000000180)={0x1, 0x1, 0xfffffffb, 0x5}) r8 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SG_NEXT_CMD_LEN(r8, 0x2283, &(0x7f0000000040)=0x55) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040093aacc4f12a400000000000000000002010000000000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1252.389201][T16686] BPF:type_id=1 [ 1252.408509][T16686] BPF: [ 1252.423614][T16686] BPF:vlen != 0 [ 1252.454869][T16686] BPF: [ 1252.454869][T16686] [ 1252.506893][T16696] BPF:[1] FWD (anon) [ 1252.555519][T16696] BPF:struct [ 1252.573103][T16696] BPF: [ 1252.588189][T16696] BPF:type != 0 [ 1252.606209][T16696] BPF: [ 1252.606209][T16696] 20:28:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r2, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x38) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f00000001c0)={r6}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000001c0)={r6, 0xfffffffb}, 0x8) r7 = fcntl$dupfd(r0, 0x406, r2) ioctl$KVM_ASSIGN_DEV_IRQ(r7, 0x4040ae70, &(0x7f0000000180)={0x1, 0x1, 0xfffffffb, 0x5}) r8 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SG_NEXT_CMD_LEN(r8, 0x2283, &(0x7f0000000040)=0x55) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040093aacc4f12a400000000000000000002010000000000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000002000000000000000000000000010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000080002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:09 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], 0x0, 0x0, 0x0) 20:28:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000007040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) 20:28:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1252.848140][T16711] BPF:[2] Invalid kind:0 [ 1252.862147][T16714] BPF:[2] PTR (anon) [ 1252.886880][T16719] BPF:[1] FWD (anon) 20:28:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1252.896825][T16714] BPF:type_id=1 20:28:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000000000000a0002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1252.933477][T16714] BPF: [ 1252.937914][T16723] BPF:[2] Invalid kind:0 [ 1252.942172][T16714] BPF:vlen != 0 [ 1252.942182][T16714] BPF: [ 1252.942182][T16714] [ 1252.967618][T16719] BPF:struct 20:28:09 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], 0x0, 0x0, 0x0) [ 1253.004863][T16719] BPF: 20:28:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x2000c045) syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', &(0x7f0000000280)='./file0\x00', 0x3, 0x5, &(0x7f00000004c0)=[{&(0x7f00000002c0)="75bf509833b750081080e8647c6cd9003a440bddfbe886f8b1ed749f3bba39b9ff3d6813177e227999ed71bd752abdb09535ff9198", 0x35, 0x1}, {&(0x7f0000000300)="2d563d0887f63c0d15848345bff2de8bc17cf0f555b7eafd3929ba5f", 0x1c, 0x7}, {&(0x7f0000000340)="dfc5ca73b8b06f8ac09f39d97cf7d638ab5153a917396613a62456e63bf181ff9ce8df6f2d9646844246b371b87b38e6e085e6e8aaab0bd804e7e8e6811df7bc7466f31c413d9cda9f47c7881cac3bfde540809947406651d93624aa3839a0dbca35f83b4acd0c5bdb33b625fc3eb1fbffd72c8dbd29c1a2df1c94b956dff6ce7fc052f5afdb826a308ee739e89f3b7965210bf8d7399232f4b025735adac7057c3ebc8744dd6a62ddd1b2acb38ef8b55fc0f62046de2965e19759edbbf1a979e503dbac61c341186d7b8c6f8b06e74fe8ad0451d00f4e1354a887b1a2b9a678d347083db2cbb2597b0f869fd95bd3a79c8a2365369736", 0xf7, 0x200}, {&(0x7f0000000440)="d740216601b01495ca3a2f469bcff1d1e3827838e3f0455192d1db923c96722ebc0596f589cad56cb14718b061c10eddbd84af67c6a6be78d7", 0x39, 0x2}, {&(0x7f0000000480)="e6aede5320696d5c5752e47f3455", 0xe, 0x7}], 0x1000800, &(0x7f0000000540)={[{@check_strict='check=strict'}], [{@subj_type={'subj_type'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) [ 1253.027895][T16719] BPF:type != 0 [ 1253.056353][T16722] BPF:[2] Invalid kind:0 [ 1253.065584][T16719] BPF: [ 1253.065584][T16719] 20:28:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000007040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1253.231324][T16739] BPF:[2] PTR (anon) [ 1253.292218][T16739] BPF:type_id=1 [ 1253.302049][T16741] BPF: (anon) type_id=0 bits_offset=0 [ 1253.337592][T16739] BPF: [ 1253.350331][T16741] BPF: [ 1253.355945][T16739] BPF:vlen != 0 [ 1253.372138][T16741] BPF:Invalid type_id [ 1253.381954][T16739] BPF: [ 1253.381954][T16739] [ 1253.411730][T16741] BPF: [ 1253.411730][T16741] [ 1253.447972][T16739] BPF:[2] PTR (anon) [ 1253.452277][T16739] BPF:type_id=1 [ 1253.463784][T16750] BPF:[1] FWD (anon) [ 1253.468911][T16749] BPF: (anon) type_id=0 bits_offset=0 [ 1253.480761][T16739] BPF: [ 1253.491858][T16750] BPF:struct [ 1253.501475][T16739] BPF:vlen != 0 [ 1253.530445][T16750] BPF: [ 1253.540365][T16739] BPF: [ 1253.540365][T16739] [ 1253.556244][T16749] BPF: [ 1253.561435][T16750] BPF:type != 0 [ 1253.577380][T16749] BPF:Invalid type_id [ 1253.586464][T16749] BPF: [ 1253.586464][T16749] [ 1253.603304][T16750] BPF: [ 1253.603304][T16750] 20:28:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r2, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x38) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f00000001c0)={r6}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000001c0)={r6, 0xfffffffb}, 0x8) r7 = fcntl$dupfd(r0, 0x406, r2) ioctl$KVM_ASSIGN_DEV_IRQ(r7, 0x4040ae70, &(0x7f0000000180)={0x1, 0x1, 0xfffffffb, 0x5}) r8 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SG_NEXT_CMD_LEN(r8, 0x2283, &(0x7f0000000040)=0x55) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040093aacc4f12a400000000000000000002010000000000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:10 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], 0x0, 0x0, 0x0) 20:28:10 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], 0x0, 0x0, 0x0) 20:28:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) socketpair(0x1e, 0xa, 0x1000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xd0, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0x6}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x6}, @CTA_EXPECT_TUPLE={0xb4, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, [], 0x1b}}, {0x14, 0x4, @private1}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010101}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0xc0}, 0x10) 20:28:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000200002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000007040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1254.079656][T16763] BPF:[1] FWD (anon) [ 1254.090240][T16765] BPF:[2] PTR (anon) [ 1254.098193][T16767] BPF: (anon) type_id=0 bits_offset=0 [ 1254.136630][T16763] BPF:struct [ 1254.142418][T16765] BPF:type_id=1 [ 1254.165351][T16767] BPF: [ 1254.171836][T16763] BPF: [ 1254.179045][T16776] BPF:[2] PTR (anon) [ 1254.186552][T16765] BPF: [ 1254.198962][T16767] BPF:Invalid type_id [ 1254.203756][T16763] BPF:type != 0 [ 1254.225389][T16765] BPF:vlen != 0 [ 1254.232578][T16776] BPF:type_id=1 20:28:10 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], 0x0, 0x0, 0x0) [ 1254.249708][T16767] BPF: [ 1254.249708][T16767] [ 1254.258121][T16763] BPF: [ 1254.258121][T16763] [ 1254.268426][T16765] BPF: [ 1254.268426][T16765] [ 1254.285157][T16776] BPF: [ 1254.287971][T16776] BPF:vlen != 0 [ 1254.291436][T16776] BPF: [ 1254.291436][T16776] 20:28:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000240002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1254.308609][T16778] BPF:[2] Invalid kind:0 [ 1254.386289][T16780] BPF: (anon) type_id=0 bits_offset=0 [ 1254.392180][T16780] BPF: 20:28:10 executing program 3: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], 0x0, 0x0, 0x0) [ 1254.427564][T16780] BPF:Invalid type_id [ 1254.484879][T16780] BPF: [ 1254.484879][T16780] 20:28:10 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000007040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) 20:28:10 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) exit_group(0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], 0x0, 0x0, 0x0) 20:28:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x24, r3, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r3, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x10000}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x846}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1254.667294][T16794] BPF:[2] PTR (anon) [ 1254.709948][T16799] BPF:[1] FWD (anon) [ 1254.732545][T16794] BPF:type_id=1 [ 1254.752937][T16799] BPF:struct [ 1254.762580][T16794] BPF: [ 1254.782811][T16799] BPF: [ 1254.785685][T16799] BPF:type != 0 [ 1254.789155][T16799] BPF: [ 1254.789155][T16799] [ 1254.790914][T16806] BPF:[2] PTR (anon) [ 1254.810590][T16794] BPF:vlen != 0 [ 1254.832576][T16806] BPF:type_id=1 [ 1254.834451][T16810] BPF: (anon) type_id=0 bits_offset=0 [ 1254.860414][T16794] BPF: [ 1254.860414][T16794] [ 1254.870258][T16810] BPF: [ 1254.923060][T16806] BPF: [ 1254.926090][T16806] BPF:vlen != 0 [ 1254.929566][T16806] BPF: [ 1254.929566][T16806] [ 1254.956659][T16810] BPF:Invalid type_id [ 1255.002261][T16810] BPF: [ 1255.002261][T16810] 20:28:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000006040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000007040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) 20:28:11 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000007040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) 20:28:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000300002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:11 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$x25(r0, &(0x7f00000003c0)="350105fae9c79e27a0c6ebd7dbc29519c0393ddabf104399278e8bb8a1cbe2ad0243dbdb", 0x24, 0x4001, &(0x7f0000000400)={0x9, @null=' \x00'}, 0x12) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="900e000030003deb0000000000000000000000007c0e0100780e01000a0001007065646974000000640e0280200e0200000000000000257609498a289a82e6070000000003"], 0xe90}}, 0x0) r1 = socket(0x1000000010, 0x80003, 0x0) sendmmsg$alg(r1, &(0x7f0000000100), 0x492492492492711, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000440)={@mcast1, 0x0}, &(0x7f0000000480)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000004c0)={@mcast2, 0x5c, r2}) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x9, 0x80) ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f0000000240)={0x4b, "24422573a031776b5660931a6ae1a5b8c13118253c35c1a727a9a6c54a23077fe337cd383bfa9dbe4b032654eea3ca8c5155d238322c1d2589e5f44f4697d39d8ce59846179104a0dcbc71d487391629414dca014d862e9469b740badafaf770c58c0bf84cae751600759269dadde4e399ca29324c3912c73df7f9f3e4c4073c"}) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1255.559964][T16834] BPF:[1] FWD (anon) [ 1255.590198][T16827] BPF:[2] PTR (anon) [ 1255.599670][T16827] BPF:type_id=1 [ 1255.608204][T16834] BPF:struct [ 1255.614393][T16835] BPF:[1] FWD (anon) 20:28:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1255.639397][T16838] BPF: (anon) type_id=0 bits_offset=0 [ 1255.640938][T16839] BPF:Invalid section offset [ 1255.651920][T16827] BPF: [ 1255.661612][T16834] BPF: [ 1255.670436][T16835] BPF:struct [ 1255.695904][T16827] BPF:vlen != 0 [ 1255.701108][T16838] BPF: [ 1255.705475][T16834] BPF:type != 0 [ 1255.709753][T16845] BPF:[2] PTR (anon) [ 1255.725031][T16838] BPF:Invalid type_id [ 1255.728901][T16835] BPF: [ 1255.741659][T16827] BPF: [ 1255.741659][T16827] [ 1255.749860][T16834] BPF: [ 1255.749860][T16834] [ 1255.761898][T16838] BPF: [ 1255.761898][T16838] [ 1255.768656][T16845] BPF:type_id=1 [ 1255.773213][T16835] BPF:type != 0 [ 1255.795807][T16845] BPF: 20:28:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000006040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1255.807602][T16835] BPF: [ 1255.807602][T16835] [ 1255.846313][T16845] BPF:vlen != 0 [ 1255.871963][T16845] BPF: [ 1255.871963][T16845] 20:28:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000370002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:12 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000007040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) 20:28:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1256.025749][T16855] BPF: (anon) type_id=0 bits_offset=0 [ 1256.097564][T16855] BPF: [ 1256.098000][T16860] BPF:[2] PTR (anon) [ 1256.100556][T16855] BPF:Invalid type_id [ 1256.146231][T16855] BPF: [ 1256.146231][T16855] [ 1256.164865][T16860] BPF:type_id=1 [ 1256.169022][T16869] BPF:[1] FWD (anon) [ 1256.181761][T16872] BPF:[2] PTR (anon) 20:28:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1256.196575][T16860] BPF: [ 1256.202130][T16869] BPF:struct [ 1256.216528][T16872] BPF:type_id=1 [ 1256.227782][T16860] BPF:vlen != 0 [ 1256.236127][T16869] BPF: [ 1256.241904][T16872] BPF: [ 1256.253014][T16860] BPF: [ 1256.253014][T16860] [ 1256.260382][T16869] BPF:type != 0 [ 1256.262985][T16872] BPF:vlen != 0 [ 1256.288833][T16869] BPF: [ 1256.288833][T16869] [ 1256.299693][T16872] BPF: 20:28:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1256.299693][T16872] 20:28:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000000000003f0002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1256.363514][T16880] BPF:Invalid section offset 20:28:12 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000007040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1256.513780][T16832] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1256.516121][T16889] BPF:[2] PTR (anon) [ 1256.549550][T16889] BPF:type_id=1 20:28:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1256.558390][T16832] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1256.570268][T16889] BPF: [ 1256.583996][T16889] BPF:vlen != 0 [ 1256.612691][T16895] BPF:[2] PTR (anon) [ 1256.632670][T16889] BPF: [ 1256.632670][T16889] 20:28:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4142, 0x80801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffeffe, 0x0, 0x5, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000000180)={&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f00000000c0)=""/187, 0xbb}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PPPIOCSCOMPRESS(r4, 0x4010744d) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r5, 0x6, 0x4, 0x0, &(0x7f0000000280)) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r5, 0x8982, &(0x7f0000000040)) prctl$PR_GET_KEEPCAPS(0x7) [ 1256.667606][T16895] BPF:type_id=1 [ 1256.679916][T16898] BPF:[1] FWD (anon) [ 1256.700254][T16895] BPF: [ 1256.708933][T16898] BPF:struct 20:28:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1256.746556][T16895] BPF:vlen != 0 [ 1256.763913][T16898] BPF: [ 1256.799352][T16895] BPF: [ 1256.799352][T16895] [ 1256.806233][T16898] BPF:type != 0 [ 1256.837625][T16898] BPF: [ 1256.837625][T16898] 20:28:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000480002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:13 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:28:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1256.929153][T16911] BPF: (anon) type_id=0 bits_offset=0 [ 1256.992860][T16911] BPF: [ 1257.022152][T16911] BPF:Invalid type_id [ 1257.042614][T16911] BPF: [ 1257.042614][T16911] 20:28:13 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 20:28:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000034000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1257.159689][T16922] BPF:[2] PTR (anon) [ 1257.190045][T16922] BPF:type_id=1 [ 1257.218564][T16922] BPF: [ 1257.245605][T16922] BPF:vlen != 0 [ 1257.261862][T16929] BPF:[2] PTR (anon) [ 1257.280097][T16922] BPF: [ 1257.280097][T16922] [ 1257.280780][T16929] BPF:type_id=1 20:28:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000034000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:13 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1257.319091][T16929] BPF: 20:28:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000034000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1257.358511][T16929] BPF:vlen != 0 20:28:13 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={0x0, &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1257.389648][T16929] BPF: [ 1257.389648][T16929] 20:28:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000000000004c0002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1257.523242][T16945] BPF: (anon) type_id=0 bits_offset=0 [ 1257.557922][T16945] BPF: [ 1257.574953][T16948] BPF:[2] PTR (anon) [ 1257.584115][T16945] BPF:Invalid type_id [ 1257.601023][T16950] BPF: (anon) type_id=0 bits_offset=0 [ 1257.614505][T16948] BPF:type_id=1 [ 1257.614611][T16945] BPF: [ 1257.614611][T16945] [ 1257.630357][T16948] BPF: [ 1257.639328][T16950] BPF: [ 1257.656910][T16948] BPF:vlen != 0 [ 1257.663153][T16950] BPF:Invalid type_id [ 1257.670906][T16955] BPF:[2] PTR (anon) [ 1257.683431][T16948] BPF: [ 1257.683431][T16948] [ 1257.691829][T16950] BPF: [ 1257.691829][T16950] [ 1257.704652][T16955] BPF:type_id=1 [ 1257.722100][T16955] BPF: [ 1257.735941][T16955] BPF:vlen != 0 [ 1257.753761][T16955] BPF: [ 1257.753761][T16955] 20:28:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000460000000700040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000034000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000034000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000600002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:14 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={0x0, &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) 20:28:14 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={0x0, &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1257.988977][T16967] BPF: (anon) type_id=0 bits_offset=0 [ 1258.004573][T16969] BPF:Invalid section offset [ 1258.005324][T16966] BPF:[2] PTR (anon) [ 1258.038084][T16967] BPF: 20:28:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000a04040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1258.061300][T16967] BPF:Invalid type_id [ 1258.077582][T16978] BPF:Invalid section offset [ 1258.091252][T16967] BPF: [ 1258.091252][T16967] [ 1258.098222][T16966] BPF:type_id=1 [ 1258.102259][T16966] BPF: [ 1258.106515][T16966] BPF:vlen != 0 [ 1258.136261][T16984] BPF:[2] PTR (anon) [ 1258.140598][T16966] BPF: [ 1258.140598][T16966] [ 1258.151883][T16984] BPF:type_id=1 [ 1258.160044][T16984] BPF: [ 1258.166940][T16984] BPF:vlen != 0 [ 1258.179660][T16984] BPF: 20:28:14 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) 20:28:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400001a31267bafae60baf40c78f8e743c4000000000000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) accept4$ax25(r2, &(0x7f0000000740)={{0x3, @rose}, [@remote, @bcast, @bcast, @netrom, @remote, @null, @bcast, @netrom]}, &(0x7f00000007c0)=0x48, 0x800) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x4, 0x0, &(0x7f0000000280)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000280)=@security={'security\x00', 0xe, 0x4, 0x438, 0xffffffff, 0x0, 0x0, 0x238, 0xffffffff, 0xffffffff, 0x368, 0x368, 0x368, 0xffffffff, 0x4, &(0x7f0000000240), {[{{@ipv6={@private0, @remote, [0xff000000, 0xff, 0xff, 0xff], [0xff, 0xffffffff], 'macsec0\x00', 'geneve1\x00', {0xff}, {0xff}, 0x5c, 0x8, 0x6, 0x52}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {'zd', 0x1}}, @common=@ah={{0x30, 'ah\x00'}, {[0x4d3, 0x4d2], 0x8, 0x80, 0x2}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x6, 0x29, "9dde746d65c70ce312d20acb562b3bd19b542f43c9305d55641f2a0150ae"}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, [0xff, 0x0, 0xffffff00, 0xff000000], [0xff000000, 0x0, 0xffffffff, 0xffffff00], 'macvtap0\x00', 'syzkaller1\x00', {0xff}, {}, 0x5c, 0x1, 0x4}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@icmp6={{0x28, 'icmp6\x00'}, {0xe, "8cb7", 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xb}}}, {{@uncond, 0x0, 0x100, 0x130, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"3edb"}}, @common=@srh={{0x30, 'srh\x00'}, {0x67, 0x40, 0x0, 0x4, 0xdd1c, 0x1020, 0x488}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0xffffffffffffffff, 0x6}, {0xffffffffffffffff, 0x6, 0x1}, 0x3, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x498) r3 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r3, 0xc0845657, &(0x7f0000000140)={0x0, @reserved}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000200)=[@sack_perm, @timestamp, @sack_perm, @sack_perm, @mss={0x2, 0x39}], 0x5) 20:28:14 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r0, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1258.179660][T16984] 20:28:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000680002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1258.225296][T16989] BPF:[1] Invalid btf_info:40a0000 20:28:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000a04040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1258.330125][T16993] BPF:Invalid magic [ 1258.408646][T17000] BPF:[1] Invalid btf_info:40a0000 [ 1258.427561][T16999] BPF:[2] PTR (anon) [ 1258.431994][T16999] BPF:type_id=1 [ 1258.465345][T17003] BPF:[2] Invalid btf_info:f4ba60ae [ 1258.488895][T16999] BPF: [ 1258.529319][T16999] BPF:vlen != 0 [ 1258.539212][T17007] BPF:[2] PTR (anon) [ 1258.555307][T16999] BPF: [ 1258.555307][T16999] [ 1258.573180][T17007] BPF:type_id=1 [ 1258.595708][T17007] BPF: [ 1258.609312][T17007] BPF:vlen != 0 [ 1258.622854][T17011] x_tables: duplicate underflow at hook 2 [ 1258.647993][T17007] BPF: [ 1258.647993][T17007] [ 1259.154737][T17011] BPF:[2] Invalid btf_info:f4ba60ae [ 1259.183403][T17013] x_tables: duplicate underflow at hook 2 20:28:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:15 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) 20:28:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000a04040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:15 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r0, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000000000006c0002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:15 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYRESHEX=r0], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:15 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1259.348826][T17022] BPF:Invalid magic [ 1259.439447][T17026] BPF:[1] Invalid btf_info:40a0000 [ 1259.448358][T17027] BPF:[2] PTR (anon) 20:28:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001002000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:15 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r0, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1259.497941][T17027] BPF:type_id=1 [ 1259.510607][T17033] BPF:btf_header not found [ 1259.558318][T17027] BPF: 20:28:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000140)={0x8800, 0x5, 0x54a4, 0x81, 0x1, 0x7, 0x101}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_CLR_FD(r3, 0x4c01) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000000200)=""/210, 0x4f, 0xd2, 0x8}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x988c2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000180)={@mcast2, 0x7, 0x0, 0x2, 0x1, 0x8f3}, 0x20) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x103, 0x29, 0x1, {0xfffffffa, [{{0x40, 0x3, 0x6}, 0x5, 0x7, 0x7, './file0'}, {{0x9b, 0x1, 0x2}, 0x1, 0xb0, 0x7, './file1'}, {{0x2, 0x2, 0x5}, 0x4, 0x4, 0x7, './file0'}, {{0x10, 0x4, 0x4}, 0x3, 0x7f, 0x7, './file0'}, {{0x4, 0x1}, 0x4, 0x3f, 0x7, './file0'}, {{0x2, 0x4, 0x8}, 0x7ff, 0x3f, 0x7, './file0'}, {{0x0, 0x2, 0x2}, 0x1, 0x5, 0x7, './file0'}, {{0x10, 0x4, 0x5}, 0xfffffffffffffff9, 0x1f, 0x7, './file0'}]}}, 0x103) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1259.583913][T17046] BPF:[2] PTR (anon) [ 1259.603379][T17027] BPF:vlen != 0 20:28:15 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) 20:28:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1259.627588][T17053] BPF:Invalid magic [ 1259.646857][T17046] BPF:type_id=1 [ 1259.650569][T17027] BPF: [ 1259.650569][T17027] 20:28:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000740002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1259.713777][T17046] BPF: [ 1259.716591][T17046] BPF:vlen != 0 [ 1259.720137][T17046] BPF: [ 1259.720137][T17046] [ 1259.827597][T17070] BPF: (anon) type_id=0 bits_offset=0 [ 1259.836823][T17068] BPF: (anon) type_id=0 bits_offset=0 [ 1259.858787][T17076] BPF:Invalid magic [ 1259.867531][T17070] BPF: 20:28:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:16 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1259.878647][T17068] BPF: [ 1259.901073][T17068] BPF:Invalid type_id [ 1259.912489][T17070] BPF:Invalid type_id [ 1259.916098][T17080] BPF:[2] PTR (anon) [ 1259.932458][ T5275] tipc: TX() has been purged, node left! 20:28:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1259.953356][T17070] BPF: [ 1259.953356][T17070] [ 1259.953839][T17068] BPF: [ 1259.953839][T17068] [ 1259.977320][T17080] BPF:type_id=1 [ 1260.029236][T17080] BPF: 20:28:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001002000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:16 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1260.081315][T17080] BPF:vlen != 0 [ 1260.086905][T17086] BPF:[2] PTR (anon) [ 1260.093249][T17089] BPF:Invalid magic [ 1260.102508][T17080] BPF: [ 1260.102508][T17080] [ 1260.112064][T17086] BPF:type_id=1 [ 1260.130305][T17086] BPF: [ 1260.156943][T17086] BPF:vlen != 0 20:28:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1260.186616][T17086] BPF: [ 1260.186616][T17086] [ 1260.242743][T17095] BPF: (anon) type_id=0 bits_offset=0 20:28:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:16 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1260.295287][T17098] BPF:Invalid magic [ 1260.295477][T17095] BPF: [ 1260.383741][T17095] BPF:Invalid type_id [ 1260.433752][T17095] BPF: [ 1260.433752][T17095] [ 1260.569727][T17110] BPF:[1] Invalid kind:0 [ 1260.737879][T17115] BPF: (anon) type_id=0 bits_offset=0 [ 1260.789380][T17115] BPF: [ 1260.813393][T17115] BPF:Invalid type_id [ 1260.846336][T17115] BPF: [ 1260.846336][T17115] 20:28:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000000000007a0002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001002000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:17 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) 20:28:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:17 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1261.637908][T17127] BPF:[1] Invalid kind:0 20:28:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1261.685929][T17128] BPF: (anon) type_id=0 bits_offset=0 [ 1261.700549][T17131] BPF:[2] PTR (anon) [ 1261.725682][T17128] BPF: 20:28:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1261.741849][T17128] BPF:Invalid type_id [ 1261.745818][T17131] BPF:type_id=1 [ 1261.760453][T17137] BPF:[2] PTR (anon) [ 1261.780157][T17131] BPF: [ 1261.791243][T17128] BPF: [ 1261.791243][T17128] [ 1261.802362][T17131] BPF:vlen != 0 [ 1261.808518][T17137] BPF:type_id=1 [ 1261.821867][T17137] BPF: [ 1261.831063][T17143] BPF:[1] Invalid kind:0 [ 1261.836579][T17131] BPF: [ 1261.836579][T17131] 20:28:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1261.839014][T17137] BPF:vlen != 0 20:28:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:18 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000704000000000000000000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1261.870860][T17137] BPF: [ 1261.870860][T17137] 20:28:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000d10002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1262.013441][T17154] BPF:[1] FWD (anon) 20:28:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1262.039575][T17156] BPF:[2] PTR (anon) [ 1262.044722][T17154] BPF:struct [ 1262.064877][T17156] BPF:type_id=1 [ 1262.070673][T17154] BPF: 20:28:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1262.093373][T17156] BPF: [ 1262.116064][T17159] BPF:[2] PTR (anon) [ 1262.127555][T17159] BPF:type_id=1 [ 1262.141289][T17159] BPF: [ 1262.152154][T17154] BPF:type != 0 [ 1262.152770][T17159] BPF:vlen != 0 [ 1262.155667][T17154] BPF: [ 1262.155667][T17154] 20:28:18 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1262.172222][T17156] BPF:vlen != 0 [ 1262.175725][T17156] BPF: [ 1262.175725][T17156] 20:28:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000fffff0002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000000000007a0002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1262.232241][T17159] BPF: [ 1262.232241][T17159] 20:28:18 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1262.289963][T17170] BPF:[1] Invalid kind:0 20:28:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x80082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, r1, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x4}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000340)="800000003804000019000300e60100006c000000010000000100000001000000004000000040005b07e17b00101308006d5ebe5a0000ffff53efa00d13f84e028304ac24554862068fd4dd2bd829957a92efc7ebcaa0ae23fa", 0x59, 0x400}], 0x9, 0x0) ioctl$RTC_UIE_OFF(r3, 0x7004) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r6, 0x58d}, 0x14}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="020025bd7000fedbdf2501000000050006008000000005000500010000000800030005000000050006000400000014000100fe880000000000000000000000000001"], 0x48}, 0x1, 0x0, 0x0, 0x888}, 0x20000000) 20:28:18 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1262.435784][T17176] BPF:[2] Invalid name_offset:251658240 [ 1262.464919][T17180] BPF:[1] Invalid kind:0 20:28:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000ffffff0002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000000000007a0002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$rose(r1, &(0x7f0000000040)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x1, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x40) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000200000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1262.634834][T17189] BPF:[2] Invalid name_offset:4278190080 [ 1262.659495][T17195] BPF:[2] PTR (anon) 20:28:18 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000007040000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1262.681749][T17198] BPF:[1] Invalid kind:0 [ 1262.682645][T17195] BPF:type_id=1 [ 1262.729591][T17204] BPF: (anon) type_id=0 bits_offset=0 [ 1262.730527][T17195] BPF: [ 1262.758116][T17204] BPF: [ 1262.766875][T17195] BPF:vlen != 0 [ 1262.777227][T17204] BPF:Invalid type_id 20:28:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000000000007a0002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1262.801377][T17204] BPF: [ 1262.801377][T17204] [ 1262.808997][T17195] BPF: [ 1262.808997][T17195] [ 1262.872011][T17206] BPF:[2] Invalid name_offset:33554432 20:28:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000300000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1262.971522][T17211] BPF:[1] FWD (anon) [ 1263.019936][T17211] BPF:struct [ 1263.047302][T17211] BPF: [ 1263.065810][T17211] BPF:type != 0 20:28:19 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1263.093749][T17211] BPF: [ 1263.093749][T17211] 20:28:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000000000007a0002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000400000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1263.156708][T17218] BPF:[2] Invalid name_offset:50331648 [ 1263.274023][T17225] BPF:[1] Invalid kind:0 [ 1263.406974][T17230] BPF:[2] Invalid name_offset:67108864 [ 1263.521130][T17237] BPF: (anon) type_id=0 bits_offset=0 [ 1263.532285][T17237] BPF: [ 1263.538500][T17237] BPF:Invalid type_id [ 1263.549010][T17237] BPF: [ 1263.549010][T17237] 20:28:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:19 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) 20:28:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000000000007a0002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000500000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:19 executing program 1: r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xfffffffffffffff9) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000040)={0xffffffffffffffe0, 0x6, 0x3, 0x100, 0x3, 0x0, 0x4, 0x361eac36}, &(0x7f00000001c0)={0x100000000, 0xc4cc, 0x1, 0x0, 0x8, 0xebf, 0x9, 0x1000}, &(0x7f0000000200)={0x5, 0x50a9, 0xb23, 0xfff, 0x0, 0x7, 0x4, 0x10001}, &(0x7f0000000240)={0x77359400}) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb0100180000080000000030000000f9000000070000000000000000000004040000000000050000000001010000000000000001000004a7933388bbd65f42ff2f95c6a8b6b25d8f9fffeab5180ae7e6c68609b7"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) setxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000300)=@random={'trusted.', 'ext4\x00'}, &(0x7f0000000340)='selinux\x00', 0x8, 0x2) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x3fc}], 0x4801, 0x0) 20:28:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x100000000, 0x22000) 20:28:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000600000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:20 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1263.808738][T17244] BPF:[2] Invalid name_offset:83886080 [ 1263.812517][T17246] BPF:[1] Invalid kind:0 [ 1263.823678][T17248] BPF:btf_header not found 20:28:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000000000007a0002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:20 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000007"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1263.992125][T17260] BPF: (anon) type_id=0 bits_offset=0 [ 1264.012624][T17264] BPF:[1] Invalid kind:0 [ 1264.025885][T17261] BPF:[2] Invalid name_offset:100663296 [ 1264.035328][T17260] BPF: 20:28:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000700000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1264.065941][T17260] BPF:Invalid type_id [ 1264.090719][T17260] BPF: [ 1264.090719][T17260] [ 1264.153414][T17271] BPF: (anon) type_id=0 bits_offset=0 [ 1264.169273][T17271] BPF: [ 1264.190141][T17271] BPF:Invalid type_id [ 1264.225131][T17275] BPF:[1] FWD (anon) [ 1264.227381][T17278] BPF:[2] Invalid name_offset:117440512 [ 1264.252289][T17275] BPF:struct [ 1264.253795][T17271] BPF: [ 1264.253795][T17271] [ 1264.268991][T17275] BPF: [ 1264.284550][T17275] BPF:Invalid name [ 1264.318647][T17284] BPF:[2] Invalid name_offset:117440512 [ 1264.329097][T17275] BPF: [ 1264.329097][T17275] 20:28:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001050000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000300004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') sendmsg$NL80211_CMD_NEW_MPATH(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="38004083084291c80000", @ANYRES16=r2, @ANYBLOB="01002dbd7000ffdbdf25170000000c00990001000000000000000a001a00aaaaaaaaaa3600000c0099009700000004000000"], 0x38}, 0x1, 0x0, 0x0, 0x8800}, 0x40890) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000800000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:20 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000007"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) 20:28:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1264.641314][T17291] BPF:[1] FWD (anon) 20:28:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000a00000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1264.670118][T17293] BPF:[2] Invalid name_offset:134217728 [ 1264.673403][T17294] BPF: (anon) type_id=0 bits_offset=0 [ 1264.685001][T17291] BPF:struct [ 1264.702122][T17294] BPF: [ 1264.707504][T17291] BPF: [ 1264.744154][T17294] BPF:Invalid type_id [ 1264.749152][T17291] BPF:Invalid name 20:28:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000300004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1264.802526][T17303] BPF: (anon) type_id=0 bits_offset=0 [ 1264.809108][T17294] BPF: [ 1264.809108][T17294] [ 1264.815219][T17291] BPF: [ 1264.815219][T17291] 20:28:21 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000007"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1264.866577][T17303] BPF: [ 1264.871045][T17303] BPF:Invalid type_id [ 1264.887934][T17303] BPF: [ 1264.887934][T17303] [ 1264.914656][T17307] BPF:[2] Invalid name_offset:167772160 20:28:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000002400000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001050000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1265.062495][T17314] BPF:[1] FWD (anon) [ 1265.109381][T17314] BPF:struct 20:28:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000300004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1265.149803][T17314] BPF: [ 1265.158255][T17319] BPF:[2] Invalid name_offset:603979776 [ 1265.168102][T17314] BPF:Invalid name 20:28:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000003000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1265.189952][T17314] BPF: [ 1265.189952][T17314] [ 1265.276461][T17323] BPF: (anon) type_id=0 bits_offset=0 [ 1265.342174][T17323] BPF: [ 1265.375791][T17323] BPF:Invalid type_id 20:28:21 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000070400"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1265.410481][T17331] BPF:[2] Invalid name_offset:805306368 [ 1265.424405][T17323] BPF: [ 1265.424405][T17323] [ 1265.504384][T17294] BPF: (anon) type_id=0 bits_offset=0 [ 1265.511264][T17294] BPF: [ 1265.527441][T17294] BPF:Invalid type_id [ 1265.544795][T17294] BPF: [ 1265.544795][T17294] [ 1265.614511][T17340] BPF:[1] FWD (anon) [ 1265.638519][T17340] BPF:struct [ 1265.656828][T17340] BPF: [ 1265.669810][T17340] BPF:type != 0 [ 1265.689166][T17340] BPF: [ 1265.689166][T17340] 20:28:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001806000000000030000000070000000000000000000000010000000000000006000002010000000000000001000004000000000013dfdf7f667d061b2681c4e16fcd0c6552efaf72"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000001000000010000001fffffff004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000003700000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:22 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000704"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) 20:28:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1265.967316][T17348] BPF:[2] Invalid name_offset:922746880 [ 1265.987705][T17351] BPF:[1] FWD (anon) 20:28:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000004800000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1266.017957][T17351] BPF:struct [ 1266.042502][T17351] BPF: 20:28:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000001000000010000001fffffff004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1266.064469][T17357] BPF:btf_header not found [ 1266.108427][T17351] BPF:type != 0 [ 1266.137612][T17351] BPF: [ 1266.137612][T17351] 20:28:22 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000007"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1266.171327][T17363] BPF:btf_header not found [ 1266.216551][T17366] BPF:[2] Invalid name_offset:1207959552 [ 1266.370444][T17370] BPF:[1] FWD (anon) [ 1266.388927][T17370] BPF:struct [ 1266.424710][T17370] BPF: [ 1266.438132][T17370] BPF:Invalid name [ 1266.472422][T17370] BPF: [ 1266.472422][T17370] 20:28:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001050000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000001000000010000001fffffff004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000004c00000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000440)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000740)=ANY=[@ANYBLOB="30000000300000000700000000000000000000040400000000000076000000000201000000000080000100000497fb40102941074ca021a9cf2210116a79bdff8147ae363b64817d4b30ad461f0fb2fa46cd0e79f301818c151040f5255004c49fb163b397987bca0b92c6f12b73477e2f676160c6c31d515f9433302f1889aeda56e42accd01ecf44a9000000000000000000000005c304550d7a809eb428dc23454ce67c2c194437c8cad38ed9a207af074da298ad8ec6f1a6b7ab9228831e8771e0def75316355c9fe83f788d6f19a7f393284f977b023c618830131e728bcaebd06c15230c8cdc3c17f69254d40fdc5b9ce3f722fdc5ce777e293d8c9758bb9ca95ffec0bbdcdea6272c9634b25883bf425a1a04fab0902ecb9ceb4ff1ca078b7016417fd4fedf51613c26ff6fbace7fb566da8a8716e2845ddb9a3e017d5a2702b46908d8b887364f70337c2dd61c8dc7507c252df75c829b3bd0af"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000680)={0x0, 0x5, 0x10, 0x6, 0x4}, &(0x7f00000006c0)=0x18) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, &(0x7f0000000700)={r5, 0xfc}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000480)={0x2, 0x100, 0x9, 0x200, 0x8, 0x23}) ioctl$VIDIOC_TRY_EXT_CTRLS(r4, 0xc0205649, &(0x7f0000000180)={0x980000, 0x7, 0x8, r2, 0x0, &(0x7f0000000140)={0x990969, 0x2b3, [], @string=&(0x7f0000000040)=0xe0}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4) sendmsg$IPCTNL_MSG_CT_GET_DYING(r8, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, 0x6, 0x1, 0x0, 0x0, 0x0, {0x5, 0x0, 0x8}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0xa0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r6, 0xc2604111, &(0x7f00000001c0)={0xc5b, [[0x63a, 0xffffffe0, 0x0, 0xfffffffc, 0xfffffffc, 0x9, 0x7fffffff, 0x10000], [0x80, 0x5, 0x3, 0x3ff, 0x7, 0x2, 0x7], [0xfffffffd, 0x0, 0xe87a, 0x5, 0xfffffffd, 0x7ff, 0x7fffffff, 0x6378cb8a]], [], [{0x0, 0xffffffed}, {0x10001, 0x20, 0x1, 0x0, 0x1, 0x1}, {0x6, 0x80000001, 0x0, 0x0, 0x0, 0x1}, {0x31aa5848, 0xfffffffb, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x7, 0x0, 0x1}, {0x6, 0x7, 0x0, 0x0, 0x1, 0x1}, {0x4, 0xffffffff}, {0x5, 0x101, 0x1, 0x1}, {0x0, 0x6, 0x0, 0x1, 0x1, 0x1}, {0x8001, 0xd5, 0x0, 0x1, 0x1}, {0xe4a000, 0x5, 0x0, 0x1, 0x1, 0x1}, {0x80000001, 0xad9a, 0x1, 0x1, 0x1}], [], 0x9}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:22 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000007"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) 20:28:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000006000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000020000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1266.582153][T17381] BPF:[2] Invalid name_offset:1275068416 [ 1266.684310][T17391] BPF:[1] FWD (anon) [ 1266.696077][T17391] BPF:struct [ 1266.709330][T17393] BPF:Unsupported btf_header [ 1266.714748][T17391] BPF: [ 1266.717891][T17394] BPF: (anon) type_id=0 bits_offset=0 [ 1266.739330][T17391] BPF:Invalid name [ 1266.762470][T17394] BPF: [ 1266.769301][T17391] BPF: [ 1266.769301][T17391] [ 1266.782963][T17394] BPF:Invalid type_id 20:28:23 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000007"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1266.808774][T17394] BPF: [ 1266.808774][T17394] [ 1266.823333][T17400] BPF:[2] Invalid name_offset:1610612736 [ 1266.950265][T17405] BPF:[1] FWD (anon) [ 1266.968129][T17405] BPF:struct [ 1266.976215][T17405] BPF: [ 1266.992378][T17405] BPF:Invalid name 20:28:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000020000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000006800000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001050000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb5f0018000000000000003000000030000000070000000000000000fa0004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SYNC(r1, 0x5001, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000000)="68461f79bfb3e776614563c82c2581acec4ada0dc2b7d8bb59abbab3b53fe234582be170cec1f85d066df02ee39c", 0x2e, 0x8}, {&(0x7f0000000280)="8843219f87189f493f6d7dc8ee2f1e77562342824d140e8cb774dbf8ea753f16a00bb912662547752c40bc5f7d52f17af086a872b05fa480b8f2363b3358837fc3005f6a1e1e6c3b2d750ac40f056b44e19b64085dbcf0dcd362a8efc4ddbf3f6591922b4fe5e990e0d7c3331117e48515f2b00cdba1becf9b919d19696c4bb8cd72bb43ac4db50cd63d0e45360707c45b2013a2d71db25d84908abac681ff67505c90c0bea2876881dc970573ae03ae55a1eff50913bb5bffabf7d500b23009681c3a9f014ba172b6300803be3886c5ffeb7e0ab6c332cde920d50f9bf5b3fbb71f8a54cc9e300822d62bbbfdff4f2ab8b6e87f054fb74e8b7496cd4d38e57ba1db8067d4278c36a9f4e0c9eec2c22b6c4f3d812ef4d11bb77c1e002e4d09037f78ad1319d97faf15f8b2b7eede60c756326fba543ed1072f318d2e0ff1a26a895236a6ce153efb6665", 0xfffffffffffffe6e, 0x200000007fff}], 0x4801, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40200, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f00000001c0)={r6}, &(0x7f0000000200)=0x8) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000400)={"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"}) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={r6, 0x6986f078}, 0x8) [ 1267.008262][T17405] BPF: [ 1267.008262][T17405] 20:28:23 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000704"], 0x0, 0x4f, 0x0, 0x8}, 0x20) 20:28:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000006c00000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1267.088113][T17414] BPF: (anon) type_id=0 bits_offset=0 [ 1267.093890][T17412] BPF:[2] Invalid name_offset:1744830464 [ 1267.094941][T17411] BPF:Unsupported version 20:28:23 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000704"], 0x0, 0x4f, 0x0, 0x8}, 0x20) [ 1267.166354][T17414] BPF: 20:28:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000020000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1267.211831][T17414] BPF:Invalid type_id [ 1267.255712][T17414] BPF: [ 1267.255712][T17414] 20:28:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000701000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000007400000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1267.322833][T17430] BPF:[2] Invalid name_offset:1811939328 20:28:23 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000704"], 0x0, 0x4f, 0x0, 0x8}, 0x20) [ 1267.528028][T17441] BPF: (anon) type_id=0 bits_offset=0 [ 1267.567939][T17441] BPF: [ 1267.585788][T17448] BPF:[2] Invalid name_offset:1946157056 [ 1267.594940][T17441] BPF:Invalid type_id [ 1267.635971][T17441] BPF: [ 1267.635971][T17441] [ 1267.865663][T17431] BPF:Unsupported version 20:28:24 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000740004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:24 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000704"], &(0x7f0000004600)=""/210, 0x4f, 0xd2}, 0x20) 20:28:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000007a00000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/194, 0x4f, 0xc2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x2, &(0x7f0000000040)=[{&(0x7f0000000d40)="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", 0x1000, 0x9}, {&(0x7f00000000c0)="e65bc0a6c00060bce53f1ea0712d396297b435320a9b4c875f308097d2092b65d7b5e7028195ed9a5e883ae36150cecb80d39b3efd2e04256f8d15898701792541e5b3e2afd1d06512e31c4ab8bca6c044ac99628e96bf512c3d7931c0cd9adda4efed8fba328b31e4", 0x69, 0x81}], 0x66ec65, 0x0) 20:28:24 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000704"], &(0x7f0000004600)=""/210, 0x4f, 0xd2}, 0x20) 20:28:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000d100000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1268.063367][T17464] BPF:[2] Invalid name_offset:2046820352 20:28:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000740004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1268.156168][T17471] BPF: (anon) type_id=0 bits_offset=0 20:28:24 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000704"], &(0x7f0000004600)=""/210, 0x4f, 0xd2}, 0x20) [ 1268.208949][T17475] BPF:Invalid string section [ 1268.214247][T17471] BPF: [ 1268.230977][T17471] BPF:Invalid type_id [ 1268.277255][T17471] BPF: [ 1268.277255][T17471] [ 1268.314489][T17481] BPF:[2] Invalid name_offset:3506438144 20:28:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000701000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$NBD_CLEAR_QUE(r1, 0xab05) 20:28:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000003000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1268.569735][T17495] BPF:[2] PTR (anon) [ 1268.580152][T17496] BPF: (anon) type_id=0 bits_offset=0 [ 1268.603264][T17498] BPF: (anon) type_id=0 bits_offset=0 [ 1268.606348][T17495] BPF:type_id=1 [ 1268.620142][T17496] BPF: [ 1268.626340][T17498] BPF: [ 1268.646348][T17498] BPF:Invalid type_id [ 1268.646774][T17496] BPF:Invalid type_id [ 1268.654009][T17504] BPF:[2] PTR (anon) [ 1268.655614][T17495] BPF: [ 1268.668783][T17498] BPF: [ 1268.668783][T17498] [ 1268.679202][T17504] BPF:type_id=1 [ 1268.693621][T17495] BPF:vlen != 0 [ 1268.695655][T17504] BPF: [ 1268.701037][T17496] BPF: [ 1268.701037][T17496] [ 1268.708432][T17504] BPF:vlen != 0 [ 1268.721219][T17495] BPF: [ 1268.721219][T17495] [ 1268.723083][T17504] BPF: [ 1268.723083][T17504] [ 1268.749362][T17507] BPF: (anon) type_id=0 bits_offset=0 [ 1268.764000][T17507] BPF: [ 1268.769975][T17507] BPF:Invalid type_id [ 1268.791688][T17507] BPF: [ 1268.791688][T17507] 20:28:25 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000740004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000007a00000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000005000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000000040000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f00000001c0)=0x0) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x2102461, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e21,rq=0x000000000000a484,uid<', @ANYRESDEC=r2, @ANYBLOB="2cd7942c15f82e75a696c549cc4a2f58e4c9f1b576e7ef12042fd34a2902aba8e3c006c2bf8c00"/49]) lsetxattr$trusted_overlay_opaque(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x0) 20:28:25 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) accept4(r0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) [ 1269.286602][T17520] BPF:[2] Invalid name_offset:2046820352 [ 1269.316075][T17522] BPF: (anon) type_id=0 bits_offset=0 [ 1269.360154][T17526] BPF: (anon) type_id=0 bits_offset=0 [ 1269.368750][T17522] BPF: [ 1269.382288][T17523] BPF:[2] PTR (anon) [ 1269.399402][T17522] BPF:Invalid type_id [ 1269.411041][T17523] BPF:type_id=1 [ 1269.422104][T17526] BPF: [ 1269.428349][T17522] BPF: [ 1269.428349][T17522] [ 1269.443297][T17523] BPF: [ 1269.455094][T17526] BPF:Invalid type_id 20:28:25 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) 20:28:25 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) [ 1269.479135][T17523] BPF:vlen != 0 [ 1269.490270][T17535] BPF:[2] PTR (anon) [ 1269.492959][T17526] BPF: [ 1269.492959][T17526] [ 1269.506858][T17523] BPF: [ 1269.506858][T17523] [ 1269.540233][T17535] BPF:type_id=1 [ 1269.581812][T17535] BPF: [ 1269.659989][T17535] BPF:vlen != 0 20:28:25 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) [ 1269.734380][T17535] BPF: [ 1269.734380][T17535] 20:28:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000006000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1269.822077][T17536] BPF: (anon) type_id=0 bits_offset=0 [ 1269.827748][T17536] BPF: [ 1269.854664][T17536] BPF:Invalid type_id [ 1269.907560][T17536] BPF: [ 1269.907560][T17536] 20:28:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x4, 0x0, &(0x7f0000000280)) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000180)=""/198, &(0x7f0000000280)=0xc6) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000140)=0x26) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000000020100"/56], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x400004, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="6c0000000100000001000000010a0000004000000040000080000000101308006d5efe5a0000ffff53ef", 0x18, 0x80100000000400}], 0x4800, 0x0) ioctl$FBIOBLANK(0xffffffffffffffff, 0x4611, 0x1) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nvme-fabrics\x00', 0x100, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000001c0)={r5}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r5, 0x7c6}, 0x8) [ 1270.023558][T17558] BPF:[2] PTR (anon) [ 1270.097112][T17558] BPF:type_id=1 [ 1270.102431][ T5275] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1270.123503][T17565] BPF:[2] PTR (anon) [ 1270.144554][T17558] BPF: [ 1270.162438][ T5275] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1270.170567][T17565] BPF:type_id=1 [ 1270.178261][T17558] BPF:vlen != 0 [ 1270.216560][T17565] BPF: [ 1270.222350][T17558] BPF: [ 1270.222350][T17558] [ 1270.229255][T17571] IPVS: length: 198 != 8 [ 1270.261948][T17565] BPF:vlen != 0 [ 1270.268985][ T5275] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1270.288499][T17573] BPF:[1] Invalid kind:0 [ 1270.315594][T17565] BPF: [ 1270.315594][T17565] [ 1270.370342][ T5275] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1270.437099][ T5275] device bridge_slave_1 left promiscuous mode [ 1270.459074][ T5275] bridge0: port 2(bridge_slave_1) entered disabled state 20:28:26 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:26 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "001700011f00000100"}) 20:28:26 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) 20:28:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r0, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690200ff3030b03a30303831302e300000000008008b004773db5cc2b528fe130c6f2e12fc5249e4e233f716aa38b28b5a7602ba", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r1, @ANYBLOB="488bcbc3b5d0a595cfb2eb7068cba8afbc1dd97b86a09d1a9880f70080930c8ff9820363e420b29556a139d3bba8c8fd6c633d6f2f2cd3c11d75d8bcc478a19e8c3bc87fc625b2394b00e8c334cc697cb1c0afcb942636826675e319a3dd7acffdf052c85b27ef234722484da4019466d910e9765fde799ccc821dc54a321224011b93b0dc7a6ee8382e592d0f301740f0000000000000716000"/166], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) migrate_pages(r0, 0x8, &(0x7f0000000040)=0x1000, &(0x7f0000000140)=0x39c) 20:28:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000007000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:26 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "001700011f00000100"}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1270.542750][ T5275] device bridge_slave_0 left promiscuous mode [ 1270.555839][ T5275] bridge0: port 1(bridge_slave_0) entered disabled state [ 1270.658298][T17588] BPF:[2] PTR (anon) [ 1270.690588][T17588] BPF:type_id=1 20:28:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100060001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000000a000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1270.834596][T17588] BPF: [ 1270.837870][T17588] BPF:vlen != 0 [ 1270.842547][T17588] BPF: [ 1270.842547][T17588] [ 1270.845943][T17592] BPF: (anon) type_id=0 bits_offset=0 [ 1270.861116][ T5275] device veth1_macvtap left promiscuous mode 20:28:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000004040000000000000000000002010000000000000001000004f2a33a6cd92f3beb0bc2cae19f9f6453fa3166f6270cacb003d4d5f45f251315d352126bf02c59f3e6aebcf63207c4412f82d569f2563006c8e8714f31b2f22a9ef94989b8e72ce67b9d25a975fd7bdde76dac10ff586434c5f0a2c7ec4afdccfc0e29fac7e74867eaf2bcbf53a606ec715abf0fef8bedc6130676f0a60d212d6873e359e1a835c9c952b67e369fc12a219d20a43d7c7723f48725c0974e71aa0000000000000000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1270.907577][T17592] BPF: [ 1270.910722][T17592] BPF:Invalid type_id [ 1270.915639][T17592] BPF: [ 1270.915639][T17592] [ 1270.923136][ T5275] device veth0_macvtap left promiscuous mode [ 1270.930851][ T5275] device veth1_vlan left promiscuous mode [ 1270.942704][ T5275] device veth0_vlan left promiscuous mode 20:28:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100050001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1271.067160][T17608] BPF:[2] PTR (anon) [ 1271.106405][T17608] BPF:type_id=1 20:28:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100060001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000003000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1271.126757][T17608] BPF: [ 1271.170099][T17615] BPF:Total section length too long [ 1271.180900][T17608] BPF:vlen != 0 [ 1271.187094][T17621] BPF:[2] PTR (anon) [ 1271.203959][T17618] BPF: (anon) type_id=0 bits_offset=0 [ 1271.216487][T17621] BPF:type_id=1 [ 1271.227705][T17608] BPF: [ 1271.227705][T17608] [ 1271.248361][T17618] BPF: [ 1271.251682][T17621] BPF: [ 1271.270639][T17621] BPF:vlen != 0 [ 1271.275800][T17618] BPF:Invalid type_id [ 1271.300153][T17621] BPF: [ 1271.300153][T17621] [ 1271.308361][T17618] BPF: [ 1271.308361][T17618] [ 1271.407526][T17631] BPF: (anon) type_id=0 bits_offset=0 [ 1271.469305][T17631] BPF: [ 1271.502825][T17631] BPF:Invalid type_id [ 1271.530213][T17631] BPF: [ 1271.530213][T17631] [ 1271.917887][T17619] BPF:Total section length too long [ 1285.336712][ T5275] device hsr_slave_0 left promiscuous mode [ 1285.391667][ T5275] device hsr_slave_1 left promiscuous mode [ 1285.543668][ T5275] team0 (unregistering): Port device team_slave_1 removed [ 1285.581479][ T5275] team0 (unregistering): Port device team_slave_0 removed [ 1285.619987][ T5275] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1285.689998][ T5275] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1285.968491][ T5275] bond0 (unregistering): Released all slaves 20:28:42 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r0, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000020000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000100000001003f0001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100060001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100060001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) [ 1286.529419][T17694] BPF: (anon) type_id=0 bits_offset=0 [ 1286.551454][T17693] BPF: (anon) type_id=0 bits_offset=0 [ 1286.561523][T17702] BPF: (anon) type_id=0 bits_offset=0 [ 1286.583831][T17694] BPF: [ 1286.592369][T17706] BPF: (anon) type_id=0 bits_offset=0 [ 1286.602029][T17696] BPF:[2] PTR (anon) [ 1286.617377][T17694] BPF:Invalid type_id [ 1286.628457][T17694] BPF: [ 1286.628457][T17694] [ 1286.629208][T17702] BPF: [ 1286.651708][T17693] BPF: 20:28:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000107000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1286.683445][T17696] BPF:type_id=1 [ 1286.692001][T17706] BPF: [ 1286.698499][T17702] BPF:Invalid type_id [ 1286.704335][T17693] BPF:Invalid type_id [ 1286.744648][T17706] BPF:Invalid type_id 20:28:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000704040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1286.766511][T17702] BPF: [ 1286.766511][T17702] [ 1286.772546][T17693] BPF: [ 1286.772546][T17693] [ 1286.777288][T17696] BPF: [ 1286.794683][T17706] BPF: [ 1286.794683][T17706] [ 1286.825553][T17696] BPF:vlen != 0 20:28:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000100000001003f0001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:43 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x4300, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0xfe, 0x1, 0x0, 0x4146, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}, 0x1b000, 0x0, 0x1000000}, 0x0, 0xfffffffffffffffd, r0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0xd, 0x0, 0x0, 0xa, 0x3}]}, {0x0, [0x0, 0x2e, 0x30]}}, &(0x7f0000000140)=""/96, 0x29, 0x60}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:43 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r0, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1286.882711][T17696] BPF: [ 1286.882711][T17696] [ 1286.941529][T17715] BPF: (anon) type_id=0 bits_offset=0 [ 1286.947091][T17715] BPF: [ 1286.964953][T17715] BPF:Invalid type_id [ 1286.969062][T17715] BPF: [ 1286.969062][T17715] [ 1287.025648][T17718] BPF: (anon) type_id=0 bits_offset=0 [ 1287.059112][T17718] BPF: [ 1287.064747][T17722] BPF:[1] Invalid btf_info:4070000 20:28:43 executing program 4: socket$nl_audit(0x10, 0x3, 0x9) clone(0x2008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x1, 0x0) poll(0x0, 0x0, 0x204) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) [ 1287.099831][T17718] BPF:Invalid type_id [ 1287.147223][T17718] BPF: [ 1287.147223][T17718] 20:28:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000007000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1287.212613][T17721] BPF: (anon) type_id=0 bits_offset=0 [ 1287.220535][T17721] BPF: [ 1287.223374][T17721] BPF:Invalid type_id [ 1287.227360][T17721] BPF: [ 1287.227360][T17721] 20:28:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000107000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000024000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$NBD_SET_SOCK(r3, 0xab00, r1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000040)={0x7, 0x2}) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000100)=0x2, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r5, 0xc0305615, &(0x7f0000000080)={0x0, {0x93, 0x8001}}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000200)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef163281a66959b4d913a3c8a1384b7a812f53dcc286e99314dfd23074423e77627524ff5f1c4835e02956a344773cf8eef2e341bfd5c8625526b6874cfa2e3f99864dc8312b89e3ca8d03d8c59aeac4af68cbc80d90b52e28acb20179db0e4c619aeed1d49c409f0a2394ee49f91cf11f5a251b41e37fd76cab0c7e5e39f1c86d81e901bda0189217e9cc72193ed7fe87dd713599e00972def098071e5ff1bf914e568ed943dce434fb6e15a03a", 0xe7, 0x400}], 0x4801, 0x0) 20:28:43 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r0, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1287.531452][T17741] BPF:[1] STRUCT (anon) [ 1287.572777][T17745] BPF:[2] PTR (anon) [ 1287.585652][T17741] BPF: [ 1287.612399][T17741] BPF:meta_left:36 meta_needed:84 20:28:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000107000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1287.621848][T17745] BPF:type_id=1 20:28:43 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r0, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1287.672407][T17751] BPF:[2] PTR (anon) [ 1287.684583][T17751] BPF:type_id=1 [ 1287.693295][T17751] BPF: [ 1287.699582][T17751] BPF:vlen != 0 [ 1287.708241][T17751] BPF: [ 1287.708241][T17751] 20:28:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000007000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1287.722593][T17745] BPF: [ 1287.738055][T17741] BPF: [ 1287.738055][T17741] [ 1287.759041][T17745] BPF:vlen != 0 [ 1287.778148][T17745] BPF: [ 1287.778148][T17745] 20:28:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000030000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:44 executing program 5: socket$nl_audit(0x10, 0x3, 0x9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = socket(0x0, 0x1, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f00000000c0)) poll(0x0, 0x0, 0x204) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) [ 1287.831400][T17759] BPF:[1] STRUCT (anon) [ 1287.836359][T17759] BPF: [ 1287.844930][T17759] BPF:meta_left:36 meta_needed:84 [ 1287.861046][T17759] BPF: [ 1287.861046][T17759] 20:28:44 executing program 2: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000300)) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000380)=r0, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000040)=ANY=[@ANYRESOCT=r0], &(0x7f0000000140)=""/202, 0x4f, 0xfffffffffffffe51, 0x8}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$HIDIOCSFLAG(r4, 0x4004480f, &(0x7f00000000c0)=0x2) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000240)="800000003804000019000300e60100006c00000001000000010000000100000040000080000000101308006d5ebe5a0000ffff53ef000000000014152e923d490abdc5afb9338cc012095b6a8c55aa7c8993464a641df79cba3c7cd72c5108b1dfea3d4cbd030c7bf67435989d17f4e0d7a1a7280bec27744be6dd2cc77051e5f31dfa4f824f4778f6de518ac7c45a9583a2b1ff5c669a452d950ea1825518df839318899577ea704d1fa2b8d48ca3e5333758e6cc1d21678e", 0xb9, 0x400}], 0x800, 0x0) [ 1287.979567][T17754] BPF: (anon) type_id=0 bits_offset=0 [ 1287.986430][T17754] BPF: [ 1288.008471][T17754] BPF:Invalid type_id [ 1288.060551][T17754] BPF: [ 1288.060551][T17754] [ 1288.105141][T17767] BPF:[2] PTR (anon) [ 1288.141456][T17774] BPF: (anon) type_id=0 bits_offset=0 [ 1288.171267][T17767] BPF:type_id=1 [ 1288.191110][T17774] BPF: [ 1288.194329][T17774] BPF:Invalid type_id [ 1288.200579][T17774] BPF: [ 1288.200579][T17774] 20:28:44 executing program 4: socket$nl_audit(0x10, 0x3, 0x9) clone(0x2008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x1, 0x0) poll(0x0, 0x0, 0x204) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) 20:28:44 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r0, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:44 executing program 2: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000300)) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000380)=r0, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000040)=ANY=[@ANYRESOCT=r0], &(0x7f0000000140)=""/202, 0x4f, 0xfffffffffffffe51, 0x8}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$HIDIOCSFLAG(r4, 0x4004480f, &(0x7f00000000c0)=0x2) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000240)="800000003804000019000300e60100006c00000001000000010000000100000040000080000000101308006d5ebe5a0000ffff53ef000000000014152e923d490abdc5afb9338cc012095b6a8c55aa7c8993464a641df79cba3c7cd72c5108b1dfea3d4cbd030c7bf67435989d17f4e0d7a1a7280bec27744be6dd2cc77051e5f31dfa4f824f4778f6de518ac7c45a9583a2b1ff5c669a452d950ea1825518df839318899577ea704d1fa2b8d48ca3e5333758e6cc1d21678e", 0xb9, 0x400}], 0x800, 0x0) 20:28:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, &(0x7f00000003c0)=@name, &(0x7f0000000400)=0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x4c, r3, 0x400, 0x70bd25, 0x25dfdbfa, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x200008}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x24004000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000000000000201000000000000000100000443af9856852aecd9d576784b48700ce432eab70cc8187f9ab0c74c0bcc9d8a8bfa88c941bcc5b9d2901b2a6bef7c20fb5a14d7df5b1525d833407112d7c7bf993e92e1fa2448176ecaab8f3c13905a952e23bdf5c7838d6d5cbe4bbc0755d905d24b488b339f33a23c78452d1413156aaeb57daf9de929b8e1774a7d3286a1c64c36750944d519513344853a4d3a478a8c0ae534fe2eebda66378035fc2041af188b25e64c"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1288.233017][T17767] BPF: [ 1288.238545][T17780] BPF:[2] PTR (anon) [ 1288.250694][T17780] BPF:type_id=1 [ 1288.260848][T17767] BPF:vlen != 0 [ 1288.266208][T17780] BPF: 20:28:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000037000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:44 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r0, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1288.295885][T17780] BPF:vlen != 0 [ 1288.309981][T17767] BPF: [ 1288.309981][T17767] [ 1288.322629][T17780] BPF: [ 1288.322629][T17780] 20:28:44 executing program 2: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000300)) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000380)=r0, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000040)=ANY=[@ANYRESOCT=r0], &(0x7f0000000140)=""/202, 0x4f, 0xfffffffffffffe51, 0x8}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$HIDIOCSFLAG(r4, 0x4004480f, &(0x7f00000000c0)=0x2) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0x1, &(0x7f0000000100)=[{&(0x7f0000000240)="800000003804000019000300e60100006c00000001000000010000000100000040000080000000101308006d5ebe5a0000ffff53ef000000000014152e923d490abdc5afb9338cc012095b6a8c55aa7c8993464a641df79cba3c7cd72c5108b1dfea3d4cbd030c7bf67435989d17f4e0d7a1a7280bec27744be6dd2cc77051e5f31dfa4f824f4778f6de518ac7c45a9583a2b1ff5c669a452d950ea1825518df839318899577ea704d1fa2b8d48ca3e5333758e6cc1d21678e", 0xb9, 0x400}], 0x800, 0x0) [ 1288.458472][T17789] BPF:Invalid string section [ 1288.488953][T17795] BPF:[2] PTR (anon) [ 1288.502669][T17795] BPF:type_id=1 [ 1288.538811][T17794] BPF:Invalid string section [ 1288.561800][T17795] BPF: 20:28:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000003f000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:44 executing program 5: socket$nl_audit(0x10, 0x3, 0x9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = socket(0x0, 0x1, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f00000000c0)) poll(0x0, 0x0, 0x204) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) [ 1288.595781][T17795] BPF:vlen != 0 [ 1288.599422][T17795] BPF: [ 1288.599422][T17795] 20:28:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x1) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='ext4\x00', 0xfffffffffffffffb) keyctl$revoke(0x3, r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205648, &(0x7f0000000280)={0x0, 0x3, 0x3, 0xffffffffffffffff, 0x0, &(0x7f0000000240)={0x990900, 0x8, [], @string=&(0x7f0000000200)=0x7f}}) ioctl$MON_IOCX_GETX(r5, 0x4018920a, &(0x7f0000000400)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000300)=""/227, 0xe3}) 20:28:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000048000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1288.748985][T17809] BPF:[2] PTR (anon) [ 1288.756801][T17809] BPF:type_id=1 [ 1288.781531][T17809] BPF: [ 1288.786266][T17809] BPF:vlen != 0 [ 1288.798889][T17809] BPF: [ 1288.798889][T17809] [ 1288.971016][T17824] BPF:[2] PTR (anon) [ 1288.987892][T17824] BPF:type_id=1 [ 1289.010218][T17827] BPF: (anon) type_id=0 bits_offset=0 [ 1289.012406][T17824] BPF: [ 1289.029077][T17824] BPF:vlen != 0 [ 1289.049223][T17830] BPF:[2] PTR (anon) [ 1289.054965][T17827] BPF: [ 1289.072923][T17824] BPF: [ 1289.072923][T17824] [ 1289.073749][T17827] BPF:Invalid type_id [ 1289.086858][T17830] BPF:type_id=1 [ 1289.121085][T17830] BPF: [ 1289.136256][T17830] BPF:vlen != 0 [ 1289.137181][T17827] BPF: [ 1289.137181][T17827] 20:28:45 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x2, 0x1, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_spirange={0x2}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote}}]}, 0x70}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030b29f0000008d3eea664a1b0f30000000000000000002010000000000000001000004000000020000000002"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, &(0x7f00000003c0)=@name, &(0x7f0000000400)=0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x4c, r3, 0x400, 0x70bd25, 0x25dfdbfa, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x200008}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x24004000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000000000000201000000000000000100000443af9856852aecd9d576784b48700ce432eab70cc8187f9ab0c74c0bcc9d8a8bfa88c941bcc5b9d2901b2a6bef7c20fb5a14d7df5b1525d833407112d7c7bf993e92e1fa2448176ecaab8f3c13905a952e23bdf5c7838d6d5cbe4bbc0755d905d24b488b339f33a23c78452d1413156aaeb57daf9de929b8e1774a7d3286a1c64c36750944d519513344853a4d3a478a8c0ae534fe2eebda66378035fc2041af188b25e64c"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000004c000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1289.186681][T17830] BPF: [ 1289.186681][T17830] 20:28:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, &(0x7f00000003c0)=@name, &(0x7f0000000400)=0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x4c, r3, 0x400, 0x70bd25, 0x25dfdbfa, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x200008}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x24004000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000000000000201000000000000000100000443af9856852aecd9d576784b48700ce432eab70cc8187f9ab0c74c0bcc9d8a8bfa88c941bcc5b9d2901b2a6bef7c20fb5a14d7df5b1525d833407112d7c7bf993e92e1fa2448176ecaab8f3c13905a952e23bdf5c7838d6d5cbe4bbc0755d905d24b488b339f33a23c78452d1413156aaeb57daf9de929b8e1774a7d3286a1c64c36750944d519513344853a4d3a478a8c0ae534fe2eebda66378035fc2041af188b25e64c"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:45 executing program 5: socket$nl_audit(0x10, 0x3, 0x9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = socket(0x0, 0x1, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f00000000c0)) poll(0x0, 0x0, 0x204) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) [ 1289.371934][T17839] BPF:[2] PTR (anon) 20:28:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000060000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1289.397635][T17839] BPF:type_id=1 [ 1289.401774][T17843] BPF:Invalid section offset 20:28:45 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x2, 0x1, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_spirange={0x2}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote}}]}, 0x70}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030b29f0000008d3eea664a1b0f30000000000000000002010000000000000001000004000000020000000002"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1289.443792][T17839] BPF: [ 1289.446872][T17839] BPF:vlen != 0 [ 1289.457927][T17839] BPF: [ 1289.457927][T17839] 20:28:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, &(0x7f00000003c0)=@name, &(0x7f0000000400)=0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x4c, r3, 0x400, 0x70bd25, 0x25dfdbfa, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x200008}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x24004000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000000000000201000000000000000100000443af9856852aecd9d576784b48700ce432eab70cc8187f9ab0c74c0bcc9d8a8bfa88c941bcc5b9d2901b2a6bef7c20fb5a14d7df5b1525d833407112d7c7bf993e92e1fa2448176ecaab8f3c13905a952e23bdf5c7838d6d5cbe4bbc0755d905d24b488b339f33a23c78452d1413156aaeb57daf9de929b8e1774a7d3286a1c64c36750944d519513344853a4d3a478a8c0ae534fe2eebda66378035fc2041af188b25e64c"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1289.623343][T17855] BPF:[2] PTR (anon) [ 1289.631759][T17856] BPF:Invalid section offset [ 1289.684237][T17855] BPF:type_id=1 20:28:45 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004000000020000000002", @ANYRES64=r0], &(0x7f0000004600)=""/193, 0x4f, 0xc1, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1289.714631][T17855] BPF: [ 1289.727893][T17855] BPF:vlen != 0 [ 1289.763678][T17855] BPF: [ 1289.763678][T17855] [ 1289.807199][T17863] BPF:[2] PTR (anon) [ 1289.812278][T17863] BPF:type_id=1 [ 1289.826218][T17863] BPF: [ 1289.844229][T17863] BPF:vlen != 0 [ 1289.875631][T17863] BPF: [ 1289.875631][T17863] [ 1289.908311][T17874] BPF: (anon) type_id=770 bits_offset=0 [ 1289.935066][T17874] BPF: [ 1289.951256][T17874] BPF:Invalid member 20:28:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000d3110a868572e9fb00300000000700000000450000000000040400000081b0e84d420881626a051c020000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80, 0x8, &(0x7f0000000380)=[{&(0x7f00000000c0)="188f0a4ad4c91194c209a73fc39261997c49a2e0f1d815e9ec85a910669283ac8f56cabec8966460963f2814e95a6f5423c14d0fe22e685e379e057efe29524dc4384f3d8a952c0a03e4790dd37c46be7cb5b326e1ce6838f61aa0bb6c79ae863cd29a5d5c37b49219a3e1afc00f3997415251396759c5d465a68c11290d6e7d3134c7d25426dd7e464bd616fdc3bd5d8132f8844567e87a007e5c54200a3b37a2d4b8c05310c43f841fc067830e0631", 0xb0, 0x1}, {&(0x7f0000000040)="8b2afba8f8ad", 0x6, 0x7}, {&(0x7f0000000180)="26cf5680c4df5f653209eff6531b585b618ae3dc662a22ef38c0c7ccb1606943e0efd6adfae047e2d7848d6b860ef3ed0a47cfe113631d4f435b175a70281a09c6916d8ed220cc3ff99c14c2a43dd47aa7a3e904882549525174d88d546bd954f0ad4ebb705978e4", 0x68, 0x9}, {&(0x7f0000000200)="cf47bc1e3cb78542145902f659de1e0b595d3ffcbccd22cc5a6b5e759dd26ffe698e118a2149593e25b13d5eafb23bb2da721c31b33de7762bdcbcc85055cb8b45f79048a47a796679ca2e4175cf9d068d", 0x51, 0x155d}, {&(0x7f0000000440)="be23728ba84fc75b4790a90eaba9ca836d69be8bb8b9d0753e9bf7f249c9bbb833", 0x21, 0x6}, {&(0x7f0000000d40)="df49e36435efa808d58151b23e4b2430f0995ce89c3116c66b9b86373bfae916f40006d2ac5cf7ecfd346ffa9039f123d323c57e1163d50d718ad074bde355a359b7bb996dab0b2b7bce3116c4a6044c4707dca56e2c9cb3e936c24bb360cb557f14779a8205dca6de2dfd4b47d9efaee2ad52eeec4f649454b6189e95764550a7b3ae7c720ecdb188b23c69bac177a0f27e854845f50e7b15e0135a738c43d1485fc61f268f510e8d2ddcbad2339fa64d2af19802b712d7dbf8541ca3b287061d39e7f7ddbd606957a7208a53db5bf0dfe4a28e50d3398265361cade8bb1ab12de792f470589c33e5f773b0153d7bd25f2b0ab6e127ef88ff221ce46c8722086b583bb25ec27742f5058e6dbb6ae80eb3822a92254528404927d28b1a9811f99597256e12aa9f93f79f63598c61d8675c40d61dd0701a546e302cf33ff8216b245280199f1c9f0cb0464391c7cda895287877231c7cb13c4fc82bcc81f6ad907743afd4532a598e6843be2a7283b74b195f73ddcd8bf5d3faf98558acd2bdcc150cd04226ac173146b4205b7f844df34b88fb9153f69c393897a52a73019158b4559cd48ca00c68eb3efa1c2005fad2a3692b0519c3a314b3cb025762761da32e737443ea7690a02b46d1a80c5001437676b1cbfe4d90e6c554f8efd10ffa97a86426b6e752ca93618342750b28b8d77f50b3ed60cfcd3a0555f5dd3f27c89d1bb86a2f681f869f3a3bd5f75789b8d54653cf678f1b8bc897c190d3644bb28d882de9a45d54879d0fe62e603d6d8e5a860c0954b8f8cc5eb76a2a0ba853bd1ff8064e81c79af388be2cbbe5ad0f6d60071b44c9e25ad4d200bfa577c5436787de0cddad13c58486bea17a6918a6279d29d42c4c0569f1c52aef7bfa255c99ab4c2031203ac478f20769f415919df590f0da8be2a6fcba89bc1729dd3fd427a6aa0721693c5f2217076aad6ad1784ed95f90fb0b012853f69fad8aae7deb5a79e61b03ae0bf5698141b01649315125ff51816160934f0be55743e5671f52a1a9f725f223daccff189802bdb2b149b0ec162dac6babf5cedf7374ddb5024efa01364570d97cb1de5b68e210c810decd16c80c516ce67af662978f5778aade8fd50e2e4bac24f084e36fb74be4afbf3c91712abb397896d7ecd42c93161c571ebc4118007aad542bb2552a1a404924261c4a02bd30a9b723f3abdb11286ccf18d8b943cea38c5a9dcad78e2c60e1ae511b0a099e03f23b05ceae912c95012aa0bd354f423ef6a5fde8648d48075bfdc4f6eb223e01915519e622345d330db3091ae370f32afe45096ad0ffa8f0abe769501f222a3ee6ed9c71df33372f607e08c61c0f644e355ab6bb3a5ed8fc31343774d95af8d13a00c8637bc709c21bee1e3a0c21c4880caa80529a779f65eb6d46ec31f3b6461a760537b03e2d31b442a16441b201380cb85eba1d6e90febbfc209d6a624b899d1fc591276a3a723e2d82fb893c4f3be2771b22a9693863c9ab22064cc0fa49fab5d7493768a71df3a957e4f697e0a28b422a386f16a29e3fd42e9d0cf40660497b8e31074b08596712c141d4b432255030565d2e80d368b225a45e2c88aa5ebe1823358b686290ac943cd948f3aefc5779d915b4dcf16902908426c93fa4fa37c203b4538f98f05b181cbcfc3aa4059b84ddd712de190a427b131136273ad685d217092a75766e33136f485cfccf3d036b745a125a9d50d5881c329a485b69b82620e0abb658fd58cadf83950a7b3395b2f3d0cd6fdd9a60117f0e1597046a84c7343d69c355de391313f1f3535df3a53d8e0da25da8fea9031c01f53cbd026160affe68a71c0eea167607b96e10567f06a107413db36bc4632dd37deb9ce28bee5c73658ed057b66a55192c3fe4d415f9ce6f4bf51b5866a4956d12a2038c9859229eac4ccca4ed39d565e37dce821228d7f614181318383428894e262018a04792eded85f87d4641fab38d7735cf4e42fb93edd64c1250e926ad04032c26922e65ae4148f30dc1204cc53fcab9514f637459df6dd0e214823567bfba6b4ebcbf7788b3240786d95b53cc5404cac631229def9857d6581c852e7951fbffc179093922ec3fef9f7a75465181dc87510eb50f856ef3beb4fb1cc0cba6d30c0c88ae9816042aa2ea4e692b627e08c202af8d32053d12b301c5a36333131e9144e141ae6d40d98d097cb2c93810598af35d171be95c40a44d42218a4f62b13f4a57486a1cce4b00ce59e29e39f54173a98d0c40f6ea04f4bcc4fc57860de285ff4b1b317eae7927cf9b0809d72013db0f44f613400c3c4b87a10dd740c82e076ba2d8b9fe614e8b5246ba30b2c59d62038fbc693b5725e9c1296948467387c12f85258c33fb94f440bca7cd1c45e4a6b869bd66d4c4e3e732e2f0be59ba452b03cddd957ca5e7c737f4d5c30a1bf1dfbb7e121da609868cb9ab7eb98055ff6289de54582858fae883ed585f776cfff7573b531eeeffdea9f22ffe9c109125d7bf14126a621507e31acd17d9bd054bd9a8916686abf41d34e565617b618ab8df47d5c7975c7bb480e71434ebc02fe35c95af559cc1c8dd29639299e463816bc3431a7ef8c69fb53efd1822a51f5adde5d4fd4a18378cabe660e0d8f0b3d0f9abf870c249a9b940e32dd0d8ed4ad96ad62b3cd929d3dc5677d0d3b709fe13de163d6ff3f47be8294a359d181590aed985867243dffb3b14b94fb6738eae9d6180edf1ec2fceca277c9f2c7e837485585cd6295395d82916ec5ae55214dfbf48703e128b5b13219188d56cb855a1d688c73e2ba4d4a994b900006c1d5e11303c0a800211000a2b0204d3fba53246f88acfb1ccdae745ffa50c386c1406637b99268a85a0025f37f2ec6a127bc4dbda4a772622886c4ad0e5e9f89c027e98777099966708ef39cffca40e40b92ecf66547f106a72b72fb4510c9d6c43ae3dbb2fa4d69ee9788801b77da4d9d8eb664009bdd2f92a0366ba5d6a391ad9ed4cf366ea6e8395601d612e9634ca0b3a6fbc93fb5b85a2c786bc6c41a8d1340b01696baeb76deb4769ad695ff4829cf019589ed174548bdd51bc8c778d5728677742ed23dccfdc60ae463ce3133154ad83f0110b0df931e219d3bee4419c830490570b57a7f25ad1435150e68863ee2935f39b58b53526cb67506c192ae243f91dd0ddf46a16e5a235f7200b47ba9dcf24af923f9a3c6c4d572f14c42d3c43eca6ceb9ba54d7590ee3d9f3e5c8e03a304c4821518f47ec74c6431f24ce5ad1d47e20064e4404b7051132981cdecd5f0c9a8a572c18a984aef8bf5bb54f8dfa3a83cfc9de5e65c29a0f299cd5faf6cbbb1a3cb286e029bcd87766aaaaaca275e87c8b18c9d1e4648c186e9d773851f496f397cd0e7bd40940553b9614fc96456dc4289bdbd1221cff423a3c5356ddbdf43ae4c5005e0d09ad0f47d7ccf18d670072851be1ecf24d527c07fb8a8faffd48c25527c22127e813ec592c9dc3ec22077e7d9b097bcf43db9b5ab6ecb4198acedefb2d3693801b2ead9ac921b93f6ced3c130ad8c8a929a2b4919ba2b742f8d3a7f6556466adf6e0de4ab16fc1ba494b6d862f7f31866b3a177fabb4f0acbfb771fe2a8fe4a76c3137f9c64ecb1af51af095b860641ba2ff9658cbf49187b072aa07e8447ae9d9619aca329889fb2c713dd694d72f2aa98edafac32eb1f5bf41320e9e7baa394d0899b436d5410efd2e36b3633c0b802b1c10695215bc276650c3c7033eeb5a51ae5dfd5796133bd08c0e6330637684c3421052dfa554b6c415d419a8ac4643d94cb49347dac09a8bfaaf6a899b9f488592aec7c47ba6ca79cd407c42eddb16f6b40cda7234a5689d493c283f9545b68805751bef6168cf2792c41179f78e1e96c997079b5fbee8248b3749aae4a37fc785db17fabda455308545dbe57f2d54867b5e410828fadfa96f16951a3233420da4271b2ec5a11668cd3b7e913d796268850ed663ed5174b14f0e7d55d1823e78b08388df4eb1b9442a0d8ced6e958ae709500371f5d7d480ce4288fb525a5f8c0e58bad6795326cb5120cf162e139b7701bdefbef16bf4e1650febc9f352044730e18d9affb67c3f49765805f283f8f5f25f2f8e21708efce571c9154743a35f62e0f51a366373486b166590490dfa33bc026b082e334ff047e49df8061209dee975516942d08b55a63761f069c55c20fcf95971711e1bb2f559584513d23fa30f22aa52aa8699ff90e00937bb694ef7de400c2febf7ae3decba60ec4a19ab1ed904d45bf23d7bdd5f70fc4908f1ad2cd6cdb2e4ec4b0b56a20a60bcd1727ba7038359cb98d8f7276cc43d573b5a1b56fafd54b8f2b1c31ee64ad7880d0dbc3e03dfc5c21706db428f4b3cb3e9519d6c264b4ca9998e1da7803e1864b617bf2d9b9aeba52837cfa828c598ec620050406b590a2998349c7138d74f4f47b47ed68f8069a3af9d2aac53643a7bad9abf357f29a8dc651aac9630de2fb8690d25f88b4a2a241fa92100a7ec5a0d8f311c04f92d138da33190e48541ab3cbf73b6890db7c69ab923f29022568318a3405f11789eac26aa50ceba8c5a9a9efceaf17831664c6e2e98856c76bc5c97316d23ed000c7a4066e556260df4116dad3f2d9107301fb184a2bbc31106630d328ef3f7d26d4baf1b8cc9768ccafa98e951773fda9d912e8ab6c5d8961e4d4e97e8682fb4ddf58e70007541639403d39cf2e221cb15edb520c1d856e2f7c3ce172ba486d60b7b2580002b6779d8f52057681922483d450a4defbea3ec5b2397920a9d3a8cdca313a007e13ebebddfcb20a50ef4678687cfcbae9c69adb7688cc8aa1d04e465e456f4234e7abbd0ba0bfdeb136fb90709f68d1f5ed6a4bccc9e4ef4f52f488fbc20fbf42aef432fe8ac68eebd2b5db3038ce0cafce1045458d94f5aebb847fc76b705ad0458a00e1f766ba78790f20539abdd27901731e45f8d21f5dfe4d860f56ddfbc956add3fd1a4dbd5cd86cef627b0a4d92dc13d72845b7aa872e99473384ee4d49203a8affe691f3b6cdd6d23d68e80a7e26fadeeba635d45727438330f034ca569ba31ef646121d68b77525e30a0140a0005226dccbe3cebe9c061d745d9adceffc41042e40ee8c34a7d8aab676d62fcdd8bd77522fe120494efeffb223156584561ae4d18f4090db2a0bee5a83bec982f4d03fb141b253cfb08f2bc3e79808fcc83b48440769985e820e3aa28fc5dd065ddc5f784a35d9b583abb06b1a285abc6de14bc2082b50d2190ca3335e457ca9c52b4dc1c4aadb92f288468dd9bc17d3c35b954a39f8ece307b39b1a025552f5a57bdda89cc112add06b99ae19ec589bdc0f5619dc99b46ed6b2f0384141700bd3c57384d61d5f7dac6b3e184cbe235beb203e8af43cf313280a05a0ef171d764b55a2cc8a1a97f4ce57b1a4a81de4e616ec9478cb64d4fbea3da84a23d9bd112df778e8795cf45c48c84cd9f96856b300efa33da7afe6a7df1f18189c97b699211ca734f169ddbbb1cead65a83fa2b726a55d10d0b4f8a446f8d8129ace71b31dc80fb9cb0dd723d667eb374193c61d993e206ceb10d085dc71edf725f3b58e5af7a785357a13e0bbf2c5ecfa9fc8837deb6bb18db0c76bea1770011fe92434eb23a3854b38d5348ad6d6d47d5eb39095b1094a73cefbcae96af0b37a84a5ee6e9ed21e16c4aacd215e11d079549a4aa152877e687b8249a960ec3916fbe2360617cc2ffecbe907636faeb23800941f0006c3fe4b65093233879b76d6495df16c3075c", 0x1000, 0x5}, {&(0x7f00000002c0)="1612139f763005c379a23349310f3febb4c528a86f65935329d4adac2d339604cff281f9313cf01e4932626b9ccb9282ac7e4470b32d6d807e8e55227154116529cf6e9d0d6d3bc0c8dd6f520ab92840c064da2adc9b1f580f356b50c1fe7da29d84755251d663cbe45cbd8668e98fc5af5389233c67fc00aec50b9df7", 0x7d, 0x8}, {&(0x7f0000000340)="3b1df5f25e863b1aecbb966a93cb31a5d9130f54d8b92ae0a066ad9c99316757d7a4fc00522d5dc03ff4069315a9", 0x2e, 0x5}], 0x4801, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000480)={{0x3, 0x0, @descriptor="152e0d2cdb96238c"}}) 20:28:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000050100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1289.983705][T17874] BPF: [ 1289.983705][T17874] 20:28:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000068000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010006000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000050100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1290.225912][T17882] BPF:btf_header not found [ 1290.226489][T17883] BPF:[2] PTR (anon) 20:28:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300050000000000000040"], 0x7c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1290.316058][T17883] BPF:type_id=1 [ 1290.332580][T17893] BPF:[2] PTR (anon) [ 1290.355203][T17893] BPF:type_id=1 [ 1290.368475][T17890] BPF:Invalid section offset [ 1290.377075][T17893] BPF: [ 1290.396472][T17893] BPF:vlen != 0 [ 1290.401517][T17883] BPF: [ 1290.414654][T17893] BPF: 20:28:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010006000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1290.414654][T17893] [ 1290.435324][T17888] BPF:btf_header not found [ 1290.456628][T17883] BPF:vlen != 0 20:28:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000050100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000006c000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1290.498460][T17883] BPF: [ 1290.498460][T17883] 20:28:46 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4141, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24a, 0x0, @perf_bp={&(0x7f00000002c0), 0x4}, 0x1b70, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xb) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x8200, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x31, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x39}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r2, 0x8001}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x8001, 0x20, @private0, 0x5}, r2}}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000003e432c7f0000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x2005c0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1290.632296][T17905] BPF: (anon) type_id=0 bits_offset=0 [ 1290.637927][T17905] BPF: [ 1290.693702][T17905] BPF:Invalid type_id [ 1290.714013][T17913] BPF:[2] PTR (anon) [ 1290.747222][T17915] BPF:Total section length too long [ 1290.753227][T17905] BPF: [ 1290.753227][T17905] [ 1290.763939][T17913] BPF:type_id=1 20:28:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000d3110a868572e9fb00300000000700000000450000000000040400000081b0e84d420881626a051c020000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80, 0x8, &(0x7f0000000380)=[{&(0x7f00000000c0)="188f0a4ad4c91194c209a73fc39261997c49a2e0f1d815e9ec85a910669283ac8f56cabec8966460963f2814e95a6f5423c14d0fe22e685e379e057efe29524dc4384f3d8a952c0a03e4790dd37c46be7cb5b326e1ce6838f61aa0bb6c79ae863cd29a5d5c37b49219a3e1afc00f3997415251396759c5d465a68c11290d6e7d3134c7d25426dd7e464bd616fdc3bd5d8132f8844567e87a007e5c54200a3b37a2d4b8c05310c43f841fc067830e0631", 0xb0, 0x1}, {&(0x7f0000000040)="8b2afba8f8ad", 0x6, 0x7}, {&(0x7f0000000180)="26cf5680c4df5f653209eff6531b585b618ae3dc662a22ef38c0c7ccb1606943e0efd6adfae047e2d7848d6b860ef3ed0a47cfe113631d4f435b175a70281a09c6916d8ed220cc3ff99c14c2a43dd47aa7a3e904882549525174d88d546bd954f0ad4ebb705978e4", 0x68, 0x9}, {&(0x7f0000000200)="cf47bc1e3cb78542145902f659de1e0b595d3ffcbccd22cc5a6b5e759dd26ffe698e118a2149593e25b13d5eafb23bb2da721c31b33de7762bdcbcc85055cb8b45f79048a47a796679ca2e4175cf9d068d", 0x51, 0x155d}, {&(0x7f0000000440)="be23728ba84fc75b4790a90eaba9ca836d69be8bb8b9d0753e9bf7f249c9bbb833", 0x21, 0x6}, {&(0x7f0000000d40)="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", 0x1000, 0x5}, {&(0x7f00000002c0)="1612139f763005c379a23349310f3febb4c528a86f65935329d4adac2d339604cff281f9313cf01e4932626b9ccb9282ac7e4470b32d6d807e8e55227154116529cf6e9d0d6d3bc0c8dd6f520ab92840c064da2adc9b1f580f356b50c1fe7da29d84755251d663cbe45cbd8668e98fc5af5389233c67fc00aec50b9df7", 0x7d, 0x8}, {&(0x7f0000000340)="3b1df5f25e863b1aecbb966a93cb31a5d9130f54d8b92ae0a066ad9c99316757d7a4fc00522d5dc03ff4069315a9", 0x2e, 0x5}], 0x4801, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000480)={{0x3, 0x0, @descriptor="152e0d2cdb96238c"}}) [ 1290.797509][T17913] BPF: [ 1290.865823][T17913] BPF:vlen != 0 [ 1290.897598][T17924] BPF:Total section length too long [ 1290.942581][T17913] BPF: [ 1290.942581][T17913] 20:28:47 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4141, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24a, 0x0, @perf_bp={&(0x7f00000002c0), 0x4}, 0x1b70, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xb) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x8200, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x31, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x39}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r2, 0x8001}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x8001, 0x20, @private0, 0x5}, r2}}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000003e432c7f0000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x2005c0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:47 executing program 5: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000e6ff00000004000000020000000002"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r3, 0x0) setgid(r3) write$FUSE_IOCTL(r1, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x69a, 0x0, 0x20, 0x84e}}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$FIONREAD(r5, 0x541b, &(0x7f0000000040)) 20:28:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4142, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000000000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x108c820, 0x0) 20:28:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000d3110a868572e9fb00300000000700000000450000000000040400000081b0e84d420881626a051c020000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80, 0x8, &(0x7f0000000380)=[{&(0x7f00000000c0)="188f0a4ad4c91194c209a73fc39261997c49a2e0f1d815e9ec85a910669283ac8f56cabec8966460963f2814e95a6f5423c14d0fe22e685e379e057efe29524dc4384f3d8a952c0a03e4790dd37c46be7cb5b326e1ce6838f61aa0bb6c79ae863cd29a5d5c37b49219a3e1afc00f3997415251396759c5d465a68c11290d6e7d3134c7d25426dd7e464bd616fdc3bd5d8132f8844567e87a007e5c54200a3b37a2d4b8c05310c43f841fc067830e0631", 0xb0, 0x1}, {&(0x7f0000000040)="8b2afba8f8ad", 0x6, 0x7}, {&(0x7f0000000180)="26cf5680c4df5f653209eff6531b585b618ae3dc662a22ef38c0c7ccb1606943e0efd6adfae047e2d7848d6b860ef3ed0a47cfe113631d4f435b175a70281a09c6916d8ed220cc3ff99c14c2a43dd47aa7a3e904882549525174d88d546bd954f0ad4ebb705978e4", 0x68, 0x9}, {&(0x7f0000000200)="cf47bc1e3cb78542145902f659de1e0b595d3ffcbccd22cc5a6b5e759dd26ffe698e118a2149593e25b13d5eafb23bb2da721c31b33de7762bdcbcc85055cb8b45f79048a47a796679ca2e4175cf9d068d", 0x51, 0x155d}, {&(0x7f0000000440)="be23728ba84fc75b4790a90eaba9ca836d69be8bb8b9d0753e9bf7f249c9bbb833", 0x21, 0x6}, {&(0x7f0000000d40)="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", 0x1000, 0x5}, {&(0x7f00000002c0)="1612139f763005c379a23349310f3febb4c528a86f65935329d4adac2d339604cff281f9313cf01e4932626b9ccb9282ac7e4470b32d6d807e8e55227154116529cf6e9d0d6d3bc0c8dd6f520ab92840c064da2adc9b1f580f356b50c1fe7da29d84755251d663cbe45cbd8668e98fc5af5389233c67fc00aec50b9df7", 0x7d, 0x8}, {&(0x7f0000000340)="3b1df5f25e863b1aecbb966a93cb31a5d9130f54d8b92ae0a066ad9c99316757d7a4fc00522d5dc03ff4069315a9", 0x2e, 0x5}], 0x4801, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000480)={{0x3, 0x0, @descriptor="152e0d2cdb96238c"}}) 20:28:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000074000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1291.408375][T17942] BPF:[2] PTR (anon) [ 1291.408379][T17937] BPF: (anon) type_id=0 bits_offset=0 [ 1291.408391][T17937] BPF: [ 1291.432924][T17940] BPF:[3] Invalid name_offset:4293263360 [ 1291.441979][T17942] BPF:type_id=1 [ 1291.450444][T17948] BPF: (anon) type_id=0 bits_offset=0 [ 1291.455972][T17948] BPF: 20:28:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000d3110a868572e9fb00300000000700000000450000000000040400000081b0e84d420881626a051c020000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80, 0x8, &(0x7f0000000380)=[{&(0x7f00000000c0)="188f0a4ad4c91194c209a73fc39261997c49a2e0f1d815e9ec85a910669283ac8f56cabec8966460963f2814e95a6f5423c14d0fe22e685e379e057efe29524dc4384f3d8a952c0a03e4790dd37c46be7cb5b326e1ce6838f61aa0bb6c79ae863cd29a5d5c37b49219a3e1afc00f3997415251396759c5d465a68c11290d6e7d3134c7d25426dd7e464bd616fdc3bd5d8132f8844567e87a007e5c54200a3b37a2d4b8c05310c43f841fc067830e0631", 0xb0, 0x1}, {&(0x7f0000000040)="8b2afba8f8ad", 0x6, 0x7}, {&(0x7f0000000180)="26cf5680c4df5f653209eff6531b585b618ae3dc662a22ef38c0c7ccb1606943e0efd6adfae047e2d7848d6b860ef3ed0a47cfe113631d4f435b175a70281a09c6916d8ed220cc3ff99c14c2a43dd47aa7a3e904882549525174d88d546bd954f0ad4ebb705978e4", 0x68, 0x9}, {&(0x7f0000000200)="cf47bc1e3cb78542145902f659de1e0b595d3ffcbccd22cc5a6b5e759dd26ffe698e118a2149593e25b13d5eafb23bb2da721c31b33de7762bdcbcc85055cb8b45f79048a47a796679ca2e4175cf9d068d", 0x51, 0x155d}, {&(0x7f0000000440)="be23728ba84fc75b4790a90eaba9ca836d69be8bb8b9d0753e9bf7f249c9bbb833", 0x21, 0x6}, {&(0x7f0000000d40)="df49e36435efa808d58151b23e4b2430f0995ce89c3116c66b9b86373bfae916f40006d2ac5cf7ecfd346ffa9039f123d323c57e1163d50d718ad074bde355a359b7bb996dab0b2b7bce3116c4a6044c4707dca56e2c9cb3e936c24bb360cb557f14779a8205dca6de2dfd4b47d9efaee2ad52eeec4f649454b6189e95764550a7b3ae7c720ecdb188b23c69bac177a0f27e854845f50e7b15e0135a738c43d1485fc61f268f510e8d2ddcbad2339fa64d2af19802b712d7dbf8541ca3b287061d39e7f7ddbd606957a7208a53db5bf0dfe4a28e50d3398265361cade8bb1ab12de792f470589c33e5f773b0153d7bd25f2b0ab6e127ef88ff221ce46c8722086b583bb25ec27742f5058e6dbb6ae80eb3822a92254528404927d28b1a9811f99597256e12aa9f93f79f63598c61d8675c40d61dd0701a546e302cf33ff8216b245280199f1c9f0cb0464391c7cda895287877231c7cb13c4fc82bcc81f6ad907743afd4532a598e6843be2a7283b74b195f73ddcd8bf5d3faf98558acd2bdcc150cd04226ac173146b4205b7f844df34b88fb9153f69c393897a52a73019158b4559cd48ca00c68eb3efa1c2005fad2a3692b0519c3a314b3cb025762761da32e737443ea7690a02b46d1a80c5001437676b1cbfe4d90e6c554f8efd10ffa97a86426b6e752ca93618342750b28b8d77f50b3ed60cfcd3a0555f5dd3f27c89d1bb86a2f681f869f3a3bd5f75789b8d54653cf678f1b8bc897c190d3644bb28d882de9a45d54879d0fe62e603d6d8e5a860c0954b8f8cc5eb76a2a0ba853bd1ff8064e81c79af388be2cbbe5ad0f6d60071b44c9e25ad4d200bfa577c5436787de0cddad13c58486bea17a6918a6279d29d42c4c0569f1c52aef7bfa255c99ab4c2031203ac478f20769f415919df590f0da8be2a6fcba89bc1729dd3fd427a6aa0721693c5f2217076aad6ad1784ed95f90fb0b012853f69fad8aae7deb5a79e61b03ae0bf5698141b01649315125ff51816160934f0be55743e5671f52a1a9f725f223daccff189802bdb2b149b0ec162dac6babf5cedf7374ddb5024efa01364570d97cb1de5b68e210c810decd16c80c516ce67af662978f5778aade8fd50e2e4bac24f084e36fb74be4afbf3c91712abb397896d7ecd42c93161c571ebc4118007aad542bb2552a1a404924261c4a02bd30a9b723f3abdb11286ccf18d8b943cea38c5a9dcad78e2c60e1ae511b0a099e03f23b05ceae912c95012aa0bd354f423ef6a5fde8648d48075bfdc4f6eb223e01915519e622345d330db3091ae370f32afe45096ad0ffa8f0abe769501f222a3ee6ed9c71df33372f607e08c61c0f644e355ab6bb3a5ed8fc31343774d95af8d13a00c8637bc709c21bee1e3a0c21c4880caa80529a779f65eb6d46ec31f3b6461a760537b03e2d31b442a16441b201380cb85eba1d6e90febbfc209d6a624b899d1fc591276a3a723e2d82fb893c4f3be2771b22a9693863c9ab22064cc0fa49fab5d7493768a71df3a957e4f697e0a28b422a386f16a29e3fd42e9d0cf40660497b8e31074b08596712c141d4b432255030565d2e80d368b225a45e2c88aa5ebe1823358b686290ac943cd948f3aefc5779d915b4dcf16902908426c93fa4fa37c203b4538f98f05b181cbcfc3aa4059b84ddd712de190a427b131136273ad685d217092a75766e33136f485cfccf3d036b745a125a9d50d5881c329a485b69b82620e0abb658fd58cadf83950a7b3395b2f3d0cd6fdd9a60117f0e1597046a84c7343d69c355de391313f1f3535df3a53d8e0da25da8fea9031c01f53cbd026160affe68a71c0eea167607b96e10567f06a107413db36bc4632dd37deb9ce28bee5c73658ed057b66a55192c3fe4d415f9ce6f4bf51b5866a4956d12a2038c9859229eac4ccca4ed39d565e37dce821228d7f614181318383428894e262018a04792eded85f87d4641fab38d7735cf4e42fb93edd64c1250e926ad04032c26922e65ae4148f30dc1204cc53fcab9514f637459df6dd0e214823567bfba6b4ebcbf7788b3240786d95b53cc5404cac631229def9857d6581c852e7951fbffc179093922ec3fef9f7a75465181dc87510eb50f856ef3beb4fb1cc0cba6d30c0c88ae9816042aa2ea4e692b627e08c202af8d32053d12b301c5a36333131e9144e141ae6d40d98d097cb2c93810598af35d171be95c40a44d42218a4f62b13f4a57486a1cce4b00ce59e29e39f54173a98d0c40f6ea04f4bcc4fc57860de285ff4b1b317eae7927cf9b0809d72013db0f44f613400c3c4b87a10dd740c82e076ba2d8b9fe614e8b5246ba30b2c59d62038fbc693b5725e9c1296948467387c12f85258c33fb94f440bca7cd1c45e4a6b869bd66d4c4e3e732e2f0be59ba452b03cddd957ca5e7c737f4d5c30a1bf1dfbb7e121da609868cb9ab7eb98055ff6289de54582858fae883ed585f776cfff7573b531eeeffdea9f22ffe9c109125d7bf14126a621507e31acd17d9bd054bd9a8916686abf41d34e565617b618ab8df47d5c7975c7bb480e71434ebc02fe35c95af559cc1c8dd29639299e463816bc3431a7ef8c69fb53efd1822a51f5adde5d4fd4a18378cabe660e0d8f0b3d0f9abf870c249a9b940e32dd0d8ed4ad96ad62b3cd929d3dc5677d0d3b709fe13de163d6ff3f47be8294a359d181590aed985867243dffb3b14b94fb6738eae9d6180edf1ec2fceca277c9f2c7e837485585cd6295395d82916ec5ae55214dfbf48703e128b5b13219188d56cb855a1d688c73e2ba4d4a994b900006c1d5e11303c0a800211000a2b0204d3fba53246f88acfb1ccdae745ffa50c386c1406637b99268a85a0025f37f2ec6a127bc4dbda4a772622886c4ad0e5e9f89c027e98777099966708ef39cffca40e40b92ecf66547f106a72b72fb4510c9d6c43ae3dbb2fa4d69ee9788801b77da4d9d8eb664009bdd2f92a0366ba5d6a391ad9ed4cf366ea6e8395601d612e9634ca0b3a6fbc93fb5b85a2c786bc6c41a8d1340b01696baeb76deb4769ad695ff4829cf019589ed174548bdd51bc8c778d5728677742ed23dccfdc60ae463ce3133154ad83f0110b0df931e219d3bee4419c830490570b57a7f25ad1435150e68863ee2935f39b58b53526cb67506c192ae243f91dd0ddf46a16e5a235f7200b47ba9dcf24af923f9a3c6c4d572f14c42d3c43eca6ceb9ba54d7590ee3d9f3e5c8e03a304c4821518f47ec74c6431f24ce5ad1d47e20064e4404b7051132981cdecd5f0c9a8a572c18a984aef8bf5bb54f8dfa3a83cfc9de5e65c29a0f299cd5faf6cbbb1a3cb286e029bcd87766aaaaaca275e87c8b18c9d1e4648c186e9d773851f496f397cd0e7bd40940553b9614fc96456dc4289bdbd1221cff423a3c5356ddbdf43ae4c5005e0d09ad0f47d7ccf18d670072851be1ecf24d527c07fb8a8faffd48c25527c22127e813ec592c9dc3ec22077e7d9b097bcf43db9b5ab6ecb4198acedefb2d3693801b2ead9ac921b93f6ced3c130ad8c8a929a2b4919ba2b742f8d3a7f6556466adf6e0de4ab16fc1ba494b6d862f7f31866b3a177fabb4f0acbfb771fe2a8fe4a76c3137f9c64ecb1af51af095b860641ba2ff9658cbf49187b072aa07e8447ae9d9619aca329889fb2c713dd694d72f2aa98edafac32eb1f5bf41320e9e7baa394d0899b436d5410efd2e36b3633c0b802b1c10695215bc276650c3c7033eeb5a51ae5dfd5796133bd08c0e6330637684c3421052dfa554b6c415d419a8ac4643d94cb49347dac09a8bfaaf6a899b9f488592aec7c47ba6ca79cd407c42eddb16f6b40cda7234a5689d493c283f9545b68805751bef6168cf2792c41179f78e1e96c997079b5fbee8248b3749aae4a37fc785db17fabda455308545dbe57f2d54867b5e410828fadfa96f16951a3233420da4271b2ec5a11668cd3b7e913d796268850ed663ed5174b14f0e7d55d1823e78b08388df4eb1b9442a0d8ced6e958ae709500371f5d7d480ce4288fb525a5f8c0e58bad6795326cb5120cf162e139b7701bdefbef16bf4e1650febc9f352044730e18d9affb67c3f49765805f283f8f5f25f2f8e21708efce571c9154743a35f62e0f51a366373486b166590490dfa33bc026b082e334ff047e49df8061209dee975516942d08b55a63761f069c55c20fcf95971711e1bb2f559584513d23fa30f22aa52aa8699ff90e00937bb694ef7de400c2febf7ae3decba60ec4a19ab1ed904d45bf23d7bdd5f70fc4908f1ad2cd6cdb2e4ec4b0b56a20a60bcd1727ba7038359cb98d8f7276cc43d573b5a1b56fafd54b8f2b1c31ee64ad7880d0dbc3e03dfc5c21706db428f4b3cb3e9519d6c264b4ca9998e1da7803e1864b617bf2d9b9aeba52837cfa828c598ec620050406b590a2998349c7138d74f4f47b47ed68f8069a3af9d2aac53643a7bad9abf357f29a8dc651aac9630de2fb8690d25f88b4a2a241fa92100a7ec5a0d8f311c04f92d138da33190e48541ab3cbf73b6890db7c69ab923f29022568318a3405f11789eac26aa50ceba8c5a9a9efceaf17831664c6e2e98856c76bc5c97316d23ed000c7a4066e556260df4116dad3f2d9107301fb184a2bbc31106630d328ef3f7d26d4baf1b8cc9768ccafa98e951773fda9d912e8ab6c5d8961e4d4e97e8682fb4ddf58e70007541639403d39cf2e221cb15edb520c1d856e2f7c3ce172ba486d60b7b2580002b6779d8f52057681922483d450a4defbea3ec5b2397920a9d3a8cdca313a007e13ebebddfcb20a50ef4678687cfcbae9c69adb7688cc8aa1d04e465e456f4234e7abbd0ba0bfdeb136fb90709f68d1f5ed6a4bccc9e4ef4f52f488fbc20fbf42aef432fe8ac68eebd2b5db3038ce0cafce1045458d94f5aebb847fc76b705ad0458a00e1f766ba78790f20539abdd27901731e45f8d21f5dfe4d860f56ddfbc956add3fd1a4dbd5cd86cef627b0a4d92dc13d72845b7aa872e99473384ee4d49203a8affe691f3b6cdd6d23d68e80a7e26fadeeba635d45727438330f034ca569ba31ef646121d68b77525e30a0140a0005226dccbe3cebe9c061d745d9adceffc41042e40ee8c34a7d8aab676d62fcdd8bd77522fe120494efeffb223156584561ae4d18f4090db2a0bee5a83bec982f4d03fb141b253cfb08f2bc3e79808fcc83b48440769985e820e3aa28fc5dd065ddc5f784a35d9b583abb06b1a285abc6de14bc2082b50d2190ca3335e457ca9c52b4dc1c4aadb92f288468dd9bc17d3c35b954a39f8ece307b39b1a025552f5a57bdda89cc112add06b99ae19ec589bdc0f5619dc99b46ed6b2f0384141700bd3c57384d61d5f7dac6b3e184cbe235beb203e8af43cf313280a05a0ef171d764b55a2cc8a1a97f4ce57b1a4a81de4e616ec9478cb64d4fbea3da84a23d9bd112df778e8795cf45c48c84cd9f96856b300efa33da7afe6a7df1f18189c97b699211ca734f169ddbbb1cead65a83fa2b726a55d10d0b4f8a446f8d8129ace71b31dc80fb9cb0dd723d667eb374193c61d993e206ceb10d085dc71edf725f3b58e5af7a785357a13e0bbf2c5ecfa9fc8837deb6bb18db0c76bea1770011fe92434eb23a3854b38d5348ad6d6d47d5eb39095b1094a73cefbcae96af0b37a84a5ee6e9ed21e16c4aacd215e11d079549a4aa152877e687b8249a960ec3916fbe2360617cc2ffecbe907636faeb23800941f0006c3fe4b65093233879b76d6495df16c3075c", 0x1000, 0x5}, {&(0x7f00000002c0)="1612139f763005c379a23349310f3febb4c528a86f65935329d4adac2d339604cff281f9313cf01e4932626b9ccb9282ac7e4470b32d6d807e8e55227154116529cf6e9d0d6d3bc0c8dd6f520ab92840c064da2adc9b1f580f356b50c1fe7da29d84755251d663cbe45cbd8668e98fc5af5389233c67fc00aec50b9df7", 0x7d, 0x8}, {&(0x7f0000000340)="3b1df5f25e863b1aecbb966a93cb31a5d9130f54d8b92ae0a066ad9c99316757d7a4fc00522d5dc03ff4069315a9", 0x2e, 0x5}], 0x4801, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000480)={{0x3, 0x0, @descriptor="152e0d2cdb96238c"}}) [ 1291.458744][T17948] BPF:Invalid type_id [ 1291.469044][T17942] BPF: 20:28:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:47 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4141, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24a, 0x0, @perf_bp={&(0x7f00000002c0), 0x4}, 0x1b70, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xb) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x8200, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x31, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x39}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r2, 0x8001}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x8001, 0x20, @private0, 0x5}, r2}}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000003e432c7f0000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x2005c0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000000000000201000000000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$fb(r1, &(0x7f0000000140)="315f659b2465a42e688cfd6d9004c0afab4869b219a9e1566206de51bb1e93065fd11adb4cca2f4323e33b24e3524b8811be16b5bf501441f4612325f7eef6917a3f4192583bdaf9b872bf64b5ff01d1204fe968c0e062bb4952f7b19185aa6ab2275063d09746a82ae58ab23e474595789862602fda75a7caf198c6065cb52b582f9fba083f957d8015502fc9d3f8614936a08344775009813d144f9b5801218da71ff981ec36690b782185b07249b46c07b4baa4cb2e0ab459b7bdec5fe1fcb2", 0xc1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1291.519696][T17952] BPF:[2] PTR (anon) [ 1291.523766][T17952] BPF:type_id=1 [ 1291.527237][T17952] BPF: [ 1291.531494][T17942] BPF:vlen != 0 [ 1291.534981][T17942] BPF: [ 1291.534981][T17942] [ 1291.549467][T17937] BPF:Invalid type_id [ 1291.553536][T17937] BPF: [ 1291.553536][T17937] [ 1291.558456][T17948] BPF: [ 1291.558456][T17948] [ 1291.625389][T17952] BPF:vlen != 0 [ 1291.648690][T17952] BPF: [ 1291.648690][T17952] 20:28:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000007a000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1291.699762][T17967] BPF:[3] Invalid kind:0 20:28:48 executing program 2: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x110400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$x25(r1, &(0x7f0000000140)="6fd931791faf5153371a2b52e166bc9f6c36420b418de206b92c39b3b918cf4c116ed13a00013d4d66beaff46f26b64698330d7a8670a6ddb6b0d89d39483a228cd7dacdec169aaa24db3086aabc5828909171a5da33b31351d992173b62e129bf939f9f48f0f9ae841ec9cd5a053fdb135a4b4430fdc96746cfbd1d98e90191015f3a280fcd791ad40a223ddcef240e1d09084d191c3942ebe190c26ff45f86a484ac617276ce5930a3088310f1824346be3733d6", 0xb5, 0x4000050, &(0x7f0000000040)={0x9, @remote={[], 0x3}}, 0x12) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r2, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000400)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)=""/210, 0x4f, 0xffffffffffffff3e, 0x1}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1291.780828][T17970] BPF:Total section length too long [ 1291.945353][T17973] BPF:[2] PTR (anon) [ 1291.956199][T17973] BPF:type_id=1 [ 1291.975535][T17973] BPF: [ 1291.985158][T17973] BPF:vlen != 0 [ 1291.991820][T17973] BPF: [ 1291.991820][T17973] 20:28:48 executing program 5: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000e6ff00000004000000020000000002"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r3, 0x0) setgid(r3) write$FUSE_IOCTL(r1, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x69a, 0x0, 0x20, 0x84e}}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$FIONREAD(r5, 0x541b, &(0x7f0000000040)) 20:28:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000000000d1000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x4142, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x100, 0x4720}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) connect$nfc_raw(r0, &(0x7f0000000180)={0x27, 0x0, 0x0, 0x7}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:48 executing program 2: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x110400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$x25(r1, &(0x7f0000000140)="6fd931791faf5153371a2b52e166bc9f6c36420b418de206b92c39b3b918cf4c116ed13a00013d4d66beaff46f26b64698330d7a8670a6ddb6b0d89d39483a228cd7dacdec169aaa24db3086aabc5828909171a5da33b31351d992173b62e129bf939f9f48f0f9ae841ec9cd5a053fdb135a4b4430fdc96746cfbd1d98e90191015f3a280fcd791ad40a223ddcef240e1d09084d191c3942ebe190c26ff45f86a484ac617276ce5930a3088310f1824346be3733d6", 0xb5, 0x4000050, &(0x7f0000000040)={0x9, @remote={[], 0x3}}, 0x12) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r2, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000400)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)=""/210, 0x4f, 0xffffffffffffff3e, 0x1}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1292.524215][T17989] BPF:[2] PTR (anon) [ 1292.529404][T17988] BPF: (anon) type_id=0 bits_offset=0 [ 1292.570257][T17989] BPF:type_id=1 [ 1292.587159][T17988] BPF: 20:28:48 executing program 2: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x110400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$x25(r1, &(0x7f0000000140)="6fd931791faf5153371a2b52e166bc9f6c36420b418de206b92c39b3b918cf4c116ed13a00013d4d66beaff46f26b64698330d7a8670a6ddb6b0d89d39483a228cd7dacdec169aaa24db3086aabc5828909171a5da33b31351d992173b62e129bf939f9f48f0f9ae841ec9cd5a053fdb135a4b4430fdc96746cfbd1d98e90191015f3a280fcd791ad40a223ddcef240e1d09084d191c3942ebe190c26ff45f86a484ac617276ce5930a3088310f1824346be3733d6", 0xb5, 0x4000050, &(0x7f0000000040)={0x9, @remote={[], 0x3}}, 0x12) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r2, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000400)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)=""/210, 0x4f, 0xffffffffffffff3e, 0x1}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1292.610522][T17989] BPF: [ 1292.613901][T17996] BPF:[3] Invalid name_offset:4293263360 [ 1292.614073][T17988] BPF:Invalid type_id [ 1292.637969][T18000] BPF:[2] PTR (anon) [ 1292.649385][T17989] BPF:vlen != 0 20:28:48 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4141, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24a, 0x0, @perf_bp={&(0x7f00000002c0), 0x4}, 0x1b70, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xb) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x8200, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x31, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x39}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r2, 0x8001}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x8001, 0x20, @private0, 0x5}, r2}}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000003e432c7f0000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x2005c0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1292.674444][T17988] BPF: [ 1292.674444][T17988] [ 1292.681567][T18000] BPF:type_id=1 [ 1292.693654][T17989] BPF: [ 1292.693654][T17989] [ 1292.707676][T18000] BPF: [ 1292.724442][T18000] BPF:vlen != 0 20:28:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000ffff0f0002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1292.773007][T18000] BPF: [ 1292.773007][T18000] 20:28:49 executing program 5: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004000000020000000002", @ANYRES16=r0], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x4, 0x0, &(0x7f0000000280)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000001c0)={0x7, 0x0, 0x4, 0x5983, 0x101}, 0x14) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:49 executing program 2: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000300000000000000000000000040400000000000000000000020100000000000000010000040000000200000000020000000000dbad4e8000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x200, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000380)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x38, r1, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x81}]}, 0x38}, 0x1, 0x0, 0x0, 0x20800}, 0x20000011) [ 1292.810957][T18010] BPF: (anon) type_id=0 bits_offset=0 [ 1292.851442][T18010] BPF: [ 1292.881378][T18010] BPF:Invalid type_id [ 1292.915451][T18010] BPF: [ 1292.915451][T18010] 20:28:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x4, 0x0, &(0x7f0000000280)) r1 = accept4$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x1c, 0x100000) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000380)=0x8000, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RMKNOD(r3, &(0x7f00000002c0)={0x14, 0x13, 0x2, {0x20, 0x1, 0x8}}, 0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r4, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x38) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r5, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r5}, 0x38) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$SIOCX25GDTEFACILITIES(r6, 0x89ea, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1292.942767][T18018] BPF:Total section length too long [ 1292.993204][T18022] BPF:[2] Invalid name_offset:4278190080 20:28:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1293.034388][T18027] BPF: (anon) type_id=770 bits_offset=0 [ 1293.054434][T18027] BPF: 20:28:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000ffffff0002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1293.080746][T18030] BPF:[2] Invalid name_offset:4278190080 [ 1293.104707][T18027] BPF:Invalid member 20:28:49 executing program 2: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000300000000000000000000000040400000000000000000000020100000000000000010000040000000200000000020000000000dbad4e8000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x200, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000380)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x38, r1, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x81}]}, 0x38}, 0x1, 0x0, 0x0, 0x20800}, 0x20000011) 20:28:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x7c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1293.175178][T18027] BPF: [ 1293.175178][T18027] 20:28:49 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r1, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690200ff3030b03a30303831302e300000000008008b004773db5cc2b528fe130c6f2e12fc5249e4e233f716aa38b28b5a7602ba", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB="488bcbc3b5d0a595cfb2eb7068cba8afbc1dd97b86a09d1a9880f70080930c8ff9820363e420b29556a139d3bba8c8fd6c633d6f2f2cd3c11d75d8bcc478a19e8c3bc87fc625b2394b00e8c334cc697cb1c0afcb942636826675e319a3dd7acffdf052c85b27ef234722484da4019466d910e9765fde799ccc821dc54a321224011b93b0dc7a6ee8382e592d0f301740f0000000000000716000"/166], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) fcntl$setownex(r0, 0xf, &(0x7f0000000280)={0x0, r2}) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000240)) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x1, 0x0) poll(0x0, 0x0, 0x204) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$ppp(0xffffffffffffffff, &(0x7f00000000c0)="14ca702223faa748dedd47eee89383fbfadc525ced77964a0875982bd7f94f82d04aa678bf634d49b9cd1ff51b0332f1a2bb3fe11739ffe1d3e9bc377005fa0f2b3b891f21ec1388336c581b2a88a800a93c5b62fcb2b353933e83341aa8ecf41e35951040f775038e0e8cf9c61e5b", 0x6f) futex(&(0x7f0000000040)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000140)=0x8) 20:28:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x4, 0x0, &(0x7f0000000280)) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000300)='gtp\x00') sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x404000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, r2, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @multicast1}, @GTPA_VERSION={0x8}, @GTPA_O_TEI={0x8, 0x9, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4081) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000840)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x11, 0x60}}]}}]}, 0x148}}, 0x0) recvfrom(r0, &(0x7f0000000180)=""/97, 0x61, 0x40000000, &(0x7f0000000200)=@ll={0x11, 0x6, r3, 0x1, 0x5, 0x6, @random="89b884bbc720"}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) r5 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x401, 0x440041) setsockopt$inet6_tcp_buf(r5, 0x6, 0xe, &(0x7f00000009c0), 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:49 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000073bc0000000000000404000000000010000000000000390d0010000120000400000002000010474c7b42941b07e4dc1c93d4024216498b7e38f67f4979b7feb7cd7917cb8c6386eb505b75e2101d120e1fbf925ebcc47ff978cc89a12bb0160a34822a61411475299d1e5f73d511ed4f9c0db16335fe61a4cb9a6e388231ebcd21c3fedd50dcd14d758d362efe25f0887375c87cdb94f3ef402567ecfbd0eb211d299f580aa8c80bcce3f1a8d631e4595f6ce90b7de9c7ee23c349748da63a368c5e916418e5496af729616d9f8b4f34a63661db"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x6a, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) socket$phonet(0x23, 0x2, 0x1) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000480)="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", 0x801, r1) keyctl$dh_compute(0x17, &(0x7f0000000040)={r0, r2, r0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x10000) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) utimes(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={{}, {r3, r4/1000+60000}}) [ 1293.335398][T18040] BPF:[2] Invalid name_offset:4278190080 [ 1293.444497][T18049] BPF:Total section length too long 20:28:49 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000073bc0000000000000404000000000010000000000000390d0010000120000400000002000010474c7b42941b07e4dc1c93d4024216498b7e38f67f4979b7feb7cd7917cb8c6386eb505b75e2101d120e1fbf925ebcc47ff978cc89a12bb0160a34822a61411475299d1e5f73d511ed4f9c0db16335fe61a4cb9a6e388231ebcd21c3fedd50dcd14d758d362efe25f0887375c87cdb94f3ef402567ecfbd0eb211d299f580aa8c80bcce3f1a8d631e4595f6ce90b7de9c7ee23c349748da63a368c5e916418e5496af729616d9f8b4f34a63661db"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x6a, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) socket$phonet(0x23, 0x2, 0x1) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000480)="d8ea660ed4a505620e750d843f9ba7e7a0c8814386e1a90dc445a934619c8f08b7ab53ae8e4b818521efe34d7bae83c84dbfb416e4f2ce6dfeba42b7814c4ae099ea13e325baea942f134eab54b21b6a6673eb7f28855622a75d3ae7eb7f65e43cbf1c76f85411fded84376a6f5d6843cc3066670b025486427c16ac6671b6afd1af449108d89bcc14c64ee54357f486fcf142ce503bdb6e082f0613d077194554c34c0a1b756f17463809e86fae34e06e457b99414dd53d1cde2d53b65b5bd23a19febe91f952b730d2042d47f75dda4ea346f9a0b0d76f8e220b3f18ae82c274c9b5b9610af0c19ab6f8cc81971744c02f36a939ccddd47e759e9d915f1018cd481ccd2e6d58f3f08488f7fe8f3c32b889537778bdfdb513e3c701a10c30dad57020d5741b9374cd1fc41baefefee53bc51dc5daf93cf4af7050d3b69e2de5164494eaceba7835226ede2f5d5c2cfd10a672cd9138d3cba1ab22feaba663aec16e857e0e0d663f43beaeedfc7143bc41429b9aa2b16b1c17bcebf42a7b5bcfd822ee90fa6cc86c1e746605bb869f38a5106cad8a867c5141d2faf57b841a17e45e684d75a7fd66e4550e30b8e2c50ebee72d71cc7b03808509ab1bd1816b85826c2261df494c58b7e55b04105b2ed0114ec2f319355d047ff18bf484e62ff4d39f98a364c73d182f2336d404356f1e861a2f08bdd26959dbda6dfd9895f318a7dff2817b637f8461ddc9293a6e31106addcdd6e9d8dbaa7cf011a8027a9e917ed15bfb2c0a9a8606f7df2e8d6dca9c094ed2e186ff63320911bb0bc21822602edc54e33283bb5696ee09b7dff571729f81556e7309b0d6fae7c9c3f2810b04e876b54772979be141af30629a528d047643b10c60b71b2a85edf2108a8c7afb6794f02ae523368d0bfb0966a3ae44a98e8d38d383c9d9c626602ce75205663823b9f49268751bab648f7d4fa896ef818ad0de90d3cbc9a5c31e3cfab01dc601ceda5d26c5dd79f105bc731a793ac438b6e8d42e6334cf8ed5ce92c275c60bff7f55dfcacbb50272cbced6cf4c796c2be6166ee9de3f3546483537074b1e7ac4e1d3244a7d2deab092e4c2dcabcc76625e227833cf50a19b638f307f8495416b29689b5ecf3c8f0c7d811d589f5f55ec35c5cbfbab037a29a81237f8dc0f2f3f65be0834eb76c1fee901de3ca3d95ce39064868db010573acc348c9a17ef0d3ebbbc4e83dbcbfca05a82dfc7532fb3c48e3ced2d04704dafc509b0d26fcb2d637497182627f42ce84a4908a10e8871b6c0855acb232217e6fe5bcfc005d0945bed2278078dfbfefc34059089447f0376df968686ca3b40bd56878e28f50c45b0ef104fec9e3a0b0d63720c396cf3d90744697400d731f991adf0b19e96d4099d5aa479ce9a2ca0ed033cd44d4815ffb110ec026a5147064344c6c451536690518a4f64e490dba51a9b5666efe9112c38ac0f44f1c681ae6fb93e00945e1752f8cf8183587d1ba95881bf9340dbb26652b9ec5bb5942d410efd0875a23fcf54298ccd682fc3e91caa4cdfe73b2d4c2db65a94c7c60755d09dd856ff76d196f203c282e501f02f94b918955ec60948ff781c8892385cb77679916b2ae241f2c13295e93719389ff653a7a5373d3f3a6736b246789f268b2635f90654cbb931e99f9214698d4edf79add40713aeb5764333dc4391eb113dd2f9e3fdc9830a4f83eced94ddf91d661d826c87e9287b8310bbf4a01cb0a3b96590fb568296c5e6ee419c34945a230ebe058db757544ddb7d972b9377fc9774f2c74e2f232653af4e226a047e6bdf6df36ad3c1156ce842e81a2268df37af5a816938d851160db013fa130a350ace4072b32c2d5979ce224f08e1a3afe78c4da97f2713810807e7b2e5a799b6276b979f0cddd3d8c21babfa3b3ffbb6476ff92f64e084e73359a7110e897fdf45f3f10563829b33ab4348f951263bb6b45291cbf8484815e25b4ab429e0b8e76274ebc3f3faafc4ca4297dff6f760e5e31db3c89f66de9d134c6e79ccf5ba7b6416e7891036d842f8a51614790318a2199ea61945e261a12a9ec3b5feef2ac76cb70dde2c7bc3c41cb2be131228dbc1e16a6a15e28b1d5958f3a8e785530dc743a4cfa1afd904f8911f369daec6f700b77d3bf5bd615c775d25e1366bbaa39b05f8967027ccdfb968a557262db8f18b49a6202a4af262ea0b792df3d72a71547d72bb68e4dc4512bd0ae6b85764880a0d3bc8d220a4deccf04ed8c0aaad5a714a132c3badbbfb61ca1d0798c3d2aa03086f72dbe3d2a1252c28abfd848aa3e047231513cbbb4673d04486e0bd1ece70a6c6a160bfa2823091c29640c8d2aa9334d0fcea4cb7db89f195c29d6e153c6e7b90b5fac0fc7051039996c06bc46090a8cc395d157f4d19ca607a25d460bd8082b9e7846267354e148f971ad7fce91a9348336031db4027aa739e3bd187826323242d877098a6a5060e74f0a9fb60f5fa8161bebd87c25b98935adf99cccbacedcecb059bb52ecfb2c209d52fc32f844f96f6e9cac4750b2dd4681413af4b8fac43ca8f54259662c4b7294313c295eaa8b0c3a296d1dc8a658e8ae9e7784722f837d74b633b5fdcd7a4f828548cf8e32e1bface5fd7fb3319cbcb70eb3d255609be06f38adddf21b4796b2903c85115e37663ddafa5e80e0e6e10c61fed6adb8fa2a47f4ca40c5d80805880f4c853d83fe639548cecfbfcffb4129e216b82911f817a7c126039e491d848a84507cc64da132fc2d794d4326daf94d200677ba700a1fc9e3d99668073727189ae5340027373bf4b06fd9ae0925c88e84012b29e6d25132ba87af12383f528c81c8a6ee5d70ee72082205d70e79eed6be80ae04312ad4a01249b24d6a8060c27d554", 0x801, r1) keyctl$dh_compute(0x17, &(0x7f0000000040)={r0, r2, r0}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x10000) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) utimes(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={{}, {r3, r4/1000+60000}}) 20:28:49 executing program 2: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000300000000000000000000000040400000000000000000000020100000000000000010000040000000200000000020000000000dbad4e8000"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x200, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000380)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x38, r1, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x81}]}, 0x38}, 0x1, 0x0, 0x0, 0x20800}, 0x20000011) 20:28:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x7c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1293.746297][T18052] BPF:Invalid string section [ 1293.782279][T18060] BPF:Total section length too long [ 1293.921993][T18060] MPI: mpi too large (16392 bits) 20:28:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000004, 0x1010, r0, 0x6d570000) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004000000020000000002"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x7c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:50 executing program 5: socket$nl_audit(0x10, 0x3, 0x9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x6a, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000480)="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", 0x801, r1) keyctl$dh_compute(0x17, &(0x7f0000000040)={r0, r2, r0}, 0x0, 0x0, 0x0) keyctl$invalidate(0x15, r2) modify_ldt$read(0x0, &(0x7f00000000c0)=""/19, 0x13) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x1, 0x0) poll(0x0, 0x0, 0x204) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000100)=0x1) futex(&(0x7f0000000040)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) 20:28:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000102010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1294.286995][T18071] MPI: mpi too large (16392 bits) 20:28:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000004, 0x1010, r0, 0x6d570000) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004000000020000000002"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1294.465887][T18077] BPF:[2] Invalid btf_info:2010000 [ 1294.489726][T18057] BPF:Invalid string section [ 1294.577482][T18086] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1294.624905][T18088] BPF:[2] Invalid btf_info:2010000 [ 1294.644193][T18086] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. 20:28:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000004, 0x1010, r0, 0x6d570000) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004000000020000000002"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000202010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010040000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x4, 0x0, &(0x7f0000000280)) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000300)='gtp\x00') sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x404000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, r2, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @multicast1}, @GTPA_VERSION={0x8}, @GTPA_O_TEI={0x8, 0x9, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4081) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000840)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x11, 0x60}}]}}]}, 0x148}}, 0x0) recvfrom(r0, &(0x7f0000000180)=""/97, 0x61, 0x40000000, &(0x7f0000000200)=@ll={0x11, 0x6, r3, 0x1, 0x5, 0x6, @random="89b884bbc720"}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) r5 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x401, 0x440041) setsockopt$inet6_tcp_buf(r5, 0x6, 0xe, &(0x7f00000009c0), 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:51 executing program 2: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x505600, 0x0) sendmsg$RDMA_NLDEV_CMD_DELLINK(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x50, 0x1404, 0x300, 0x70bd25, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0xc010) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYRESHEX=r0], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0xb}, 0x20) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6, 0x0, &(0x7f0000000100), 0x4801, 0x0) 20:28:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000302010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1294.995886][T18098] BPF:[2] Invalid btf_info:2020000 [ 1295.013653][T18097] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. 20:28:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010020000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1295.068425][T18097] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. 20:28:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x4, 0x0, &(0x7f0000000280)) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000300)='gtp\x00') sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x404000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, r2, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @multicast1}, @GTPA_VERSION={0x8}, @GTPA_O_TEI={0x8, 0x9, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4081) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000840)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x11, 0x60}}]}}]}, 0x148}}, 0x0) recvfrom(r0, &(0x7f0000000180)=""/97, 0x61, 0x40000000, &(0x7f0000000200)=@ll={0x11, 0x6, r3, 0x1, 0x5, 0x6, @random="89b884bbc720"}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) r5 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x401, 0x440041) setsockopt$inet6_tcp_buf(r5, 0x6, 0xe, &(0x7f00000009c0), 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000402010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1295.202955][T18108] BPF:[2] Invalid btf_info:2030000 [ 1295.212202][T18110] BPF: (anon) type_id=0 bits_offset=0 20:28:51 executing program 2: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x505600, 0x0) sendmsg$RDMA_NLDEV_CMD_DELLINK(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x50, 0x1404, 0x300, 0x70bd25, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0xc010) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYRESHEX=r0], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0xb}, 0x20) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6, 0x0, &(0x7f0000000100), 0x4801, 0x0) [ 1295.248604][T18110] BPF: 20:28:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1295.270159][T18116] BPF: (anon) type_id=0 bits_offset=0 [ 1295.281230][T18110] BPF:Invalid type_id 20:28:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000502010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1295.321720][T18110] BPF: [ 1295.321720][T18110] [ 1295.336136][T18116] BPF: [ 1295.356688][T18116] BPF:Invalid type_id [ 1295.363386][T18122] BPF:[2] Invalid btf_info:2040000 20:28:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010007000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1295.388342][T18116] BPF: [ 1295.388342][T18116] 20:28:51 executing program 4: socket$nl_audit(0x10, 0x3, 0x9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x1, 0x0) poll(0x0, 0x0, 0x204) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r4, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r6, 0x0) fsetxattr$system_posix_acl(r1, &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {0x1, 0x1}, [{0x2, 0x4}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x5}, {0x8, 0x1, r2}, {0x8, 0x2, r4}, {0x8, 0x5, r6}], {0x10, 0x4}}, 0x54, 0x3) futex(&(0x7f0000000040)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) [ 1295.441680][T18126] BPF:Invalid string section 20:28:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000500000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1295.516953][T18131] BPF: (anon) type_id=0 bits_offset=0 [ 1295.524663][T18131] BPF: [ 1295.533346][T18131] BPF:Invalid type_id [ 1295.543880][T18131] BPF: [ 1295.543880][T18131] 20:28:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000400000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1295.595733][T18133] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. 20:28:51 executing program 2: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x505600, 0x0) sendmsg$RDMA_NLDEV_CMD_DELLINK(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x50, 0x1404, 0x300, 0x70bd25, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0xc010) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYRESHEX=r0], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0xb}, 0x20) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6, 0x0, &(0x7f0000000100), 0x4801, 0x0) [ 1295.695037][T18140] BPF:[2] Invalid btf_info:2050000 [ 1295.739620][T18133] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. 20:28:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000602010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1295.807922][T18148] BPF:[1] Invalid name_offset:83886080 [ 1295.848627][T18140] BPF:[2] Invalid btf_info:2050000 20:28:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000f0000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1295.892946][T18160] BPF: (anon) type_id=0 bits_offset=0 20:28:52 executing program 2: socket$nl_audit(0x10, 0x3, 0x9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = socket(0x0, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0xce, &(0x7f0000000100)=0x80000000, 0x4) poll(0x0, 0x0, 0x204) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f00000000c0)=0x1, 0x8c, 0x6, 0x0, 0x0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r2, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x38) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r3, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x38) dup2(r2, r3) [ 1295.984622][T18160] BPF: [ 1296.007388][T18160] BPF:Invalid type_id 20:28:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000400000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1296.051133][T18160] BPF: [ 1296.051133][T18160] 20:28:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000702010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1296.086591][T18163] BPF:[2] Invalid btf_info:2060000 [ 1296.208850][T18169] BPF: (anon) type_id=0 bits_offset=0 [ 1296.249802][T18169] BPF: 20:28:52 executing program 2: socket$nl_audit(0x10, 0x3, 0x9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = socket(0x0, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0xce, &(0x7f0000000100)=0x80000000, 0x4) poll(0x0, 0x0, 0x204) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f00000000c0)=0x1, 0x8c, 0x6, 0x0, 0x0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r2, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x38) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r3, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x38) dup2(r2, r3) [ 1296.278048][T18175] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1296.288189][T18169] BPF:Invalid type_id 20:28:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000802010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1296.318811][T18178] BPF:[2] Invalid btf_info:2070000 [ 1296.324557][T18169] BPF: [ 1296.324557][T18169] [ 1296.354387][T18180] BPF: (anon) type_id=0 bits_offset=0 [ 1296.365725][T18175] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1296.393413][T18180] BPF: [ 1296.438148][T18180] BPF:Invalid type_id [ 1296.486272][T18180] BPF: [ 1296.486272][T18180] 20:28:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000005010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000007010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000007a000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:52 executing program 2: socket$nl_audit(0x10, 0x3, 0x9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = socket(0x0, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0xce, &(0x7f0000000100)=0x80000000, 0x4) poll(0x0, 0x0, 0x204) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f00000000c0)=0x1, 0x8c, 0x6, 0x0, 0x0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r2, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x38) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r3, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x38) dup2(r2, r3) [ 1296.637970][T18190] BPF:[2] Invalid btf_info:2080000 20:28:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000a02010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1296.683115][T18195] BPF: (anon) type_id=0 bits_offset=0 [ 1296.721348][T18196] BPF: (anon) type_id=0 bits_offset=0 [ 1296.737445][T18195] BPF: [ 1296.744781][T18190] BPF:[2] Invalid btf_info:2080000 [ 1296.757973][T18195] BPF:Invalid type_id [ 1296.805329][T18196] BPF: [ 1296.812263][T18195] BPF: [ 1296.812263][T18195] [ 1296.826089][T18207] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1296.850478][T18196] BPF:Invalid type_id [ 1296.870196][T18209] BPF:[1] STRUCT (anon) [ 1296.903686][T18196] BPF: [ 1296.903686][T18196] [ 1296.927910][T18209] BPF: [ 1296.961715][T18209] BPF:meta_left:36 meta_needed:1464 [ 1296.973663][T18207] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. 20:28:53 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x1, 0x0) poll(0x0, 0x0, 0x204) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690200ff3030b03a30303831302e300000000008008b004773db5cc2b528fe130c6f2e12fc5249e4e233f716aa38b28b5a7602ba", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="488bcbc3b5d0a595cfb2eb7068cba8afbc1dd97b86a09d1a9880f70080930c8ff9820363e420b29556a139d3bba8c8fd6c633d6f2f2cd3c11d75d8bcc478a19e8c3bc87fc625b2394b00e8c334cc697cb1c0afcb942636826675e319a3dd7acffdf052c85b27ef234722484da4019466d910e9765fde799ccc821dc54a321224011b93b0dc7a6ee8382e592d0f301740f0000000000000716000"/166], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) getresuid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f00000001c0)) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r6, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={r3, r4, r6}, 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20000, 0x0) futex(&(0x7f0000000040)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) 20:28:53 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x1, 0x0) poll(0x0, 0x0, 0x204) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690200ff3030b03a30303831302e300000000008008b004773db5cc2b528fe130c6f2e12fc5249e4e233f716aa38b28b5a7602ba", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="488bcbc3b5d0a595cfb2eb7068cba8afbc1dd97b86a09d1a9880f70080930c8ff9820363e420b29556a139d3bba8c8fd6c633d6f2f2cd3c11d75d8bcc478a19e8c3bc87fc625b2394b00e8c334cc697cb1c0afcb942636826675e319a3dd7acffdf052c85b27ef234722484da4019466d910e9765fde799ccc821dc54a321224011b93b0dc7a6ee8382e592d0f301740f0000000000000716000"/166], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) getresuid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f00000001c0)) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r6, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={r3, r4, r6}, 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20000, 0x0) futex(&(0x7f0000000040)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) 20:28:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r6, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, r6}, 0x38) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000140)={0x6, 0x9, 0x4, 0x0, 0x4, {r2, r3/1000+10000}, {0x2, 0x8, 0x2, 0x20, 0xcd, 0x8, "14f25395"}, 0x9, 0x1, @fd=r5, 0x6, 0x0, r6}) ioctl$KVM_HYPERV_EVENTFD(r7, 0x4018aebd, &(0x7f0000000280)={0x4, r7, 0x1}) ioctl$NBD_SET_SIZE_BLOCKS(r7, 0xab07, 0x4) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SIOCX25GFACILITIES(r9, 0x89e2, &(0x7f00000002c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010400a5879633d01ce41ad694747891d400d90002000000000200000000000000000000ed6a7a3ceb4eb6f6522951c922329c4685ff35629827698b1a44a9f53f4c0e3229c150c1b3614f4682fc6870e9115648f53df87f4421e5c1f012029052119c602f84c176288c86ed847df768735da4eda5ea17e9e4eabfe987a227e6f8"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1297.038277][T18209] BPF: [ 1297.038277][T18209] [ 1297.055904][T18214] BPF:[2] Invalid btf_info:20a0000 20:28:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000002002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:53 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x1, 0x0) poll(0x0, 0x0, 0x204) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690200ff3030b03a30303831302e300000000008008b004773db5cc2b528fe130c6f2e12fc5249e4e233f716aa38b28b5a7602ba", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="488bcbc3b5d0a595cfb2eb7068cba8afbc1dd97b86a09d1a9880f70080930c8ff9820363e420b29556a139d3bba8c8fd6c633d6f2f2cd3c11d75d8bcc478a19e8c3bc87fc625b2394b00e8c334cc697cb1c0afcb942636826675e319a3dd7acffdf052c85b27ef234722484da4019466d910e9765fde799ccc821dc54a321224011b93b0dc7a6ee8382e592d0f301740f0000000000000716000"/166], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) getresuid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f00000001c0)) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r6, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={r3, r4, r6}, 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20000, 0x0) futex(&(0x7f0000000040)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) [ 1297.428023][T18230] BPF:[2] Invalid btf_info:2200000 [ 1297.489998][T18235] BPF:[2] Invalid btf_info:2200000 20:28:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000002402010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1297.671714][T18234] BPF:[2] PTR (anon) [ 1297.676509][T18234] BPF:type_id=2768241665 [ 1297.749126][T18234] BPF: [ 1297.775651][T18234] BPF:Invalid type_id [ 1297.792367][T18249] BPF:[2] Invalid btf_info:2240000 [ 1297.815069][T18234] BPF: [ 1297.815069][T18234] 20:28:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000007010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:28:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c00020008"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="fe2f0000000000001c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008df0000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="200002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}}, 0x0) 20:28:54 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x1, 0x0) poll(0x0, 0x0, 0x204) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690200ff3030b03a30303831302e300000000008008b004773db5cc2b528fe130c6f2e12fc5249e4e233f716aa38b28b5a7602ba", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="488bcbc3b5d0a595cfb2eb7068cba8afbc1dd97b86a09d1a9880f70080930c8ff9820363e420b29556a139d3bba8c8fd6c633d6f2f2cd3c11d75d8bcc478a19e8c3bc87fc625b2394b00e8c334cc697cb1c0afcb942636826675e319a3dd7acffdf052c85b27ef234722484da4019466d910e9765fde799ccc821dc54a321224011b93b0dc7a6ee8382e592d0f301740f0000000000000716000"/166], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) getresuid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f00000001c0)) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r6, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={r3, r4, r6}, 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20000, 0x0) futex(&(0x7f0000000040)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) 20:28:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000003002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000003702010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1298.107397][T18261] BPF:[2] Invalid btf_info:2300000 [ 1298.123085][T18264] BPF: (anon) type_id=0 bits_offset=0 [ 1298.140093][T18269] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 1298.222642][T18264] BPF: [ 1298.280516][T18264] BPF:Invalid type_id 20:28:54 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x0) [ 1298.340445][T18264] BPF: [ 1298.340445][T18264] [ 1298.401956][T18269] device bond1 entered promiscuous mode [ 1298.460142][T18320] BPF:[2] Invalid btf_info:2370000 [ 1298.489682][T18323] BPF:[2] Invalid btf_info:2370000 [ 1298.586718][T18277] bond1: (slave veth285): making interface the new active one [ 1298.622900][T18277] device veth285 entered promiscuous mode 20:28:54 executing program 1: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) rt_sigaction(0xc, &(0x7f0000000180)={&(0x7f0000000100)="7c004e0f7eb6f0ae50030f1c62c166400f3a0fab0a00000004dfc5c4027d3fe566470f113b660f2f785f670f2ba80e0000002599899999", 0x4, &(0x7f0000000140)="f2df590bc46125767452e7875c3051c4e1f810f9c4e2fd1c43c1c1e3ab6546d3c63e42e200c402a947cdc4a2399ae3", {[0x1]}}, &(0x7f0000000240)={&(0x7f00000001c0)="c4a10dd5961d000000c481235c1cb42667f20f12f5f3436f42a4c4017c5aff3c2ac44178511e400f13ae00000000c481fc510b", 0x0, &(0x7f0000000200)="3e410f01d845894d07c461ff123bf0f69504000000c46331782f1ac44175facb460f6f14a9f0440fb32f450fe4167600"}, 0x8, &(0x7f0000000280)) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000001000050774740000dfdbdfa65501a381", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="6326ffc30340a59af4c3650421f9a5377986fc254ec2862883ce7257cd4f7ae2dcfdaef81c581d1b4223e49887ee68e87ed537d5b2e957e1fac165be3eb34c5174f6279277376cbe5d10966df793456b54921f664921e1615264cc762c189704152109b0dff9eb9ca92da732cc5b46ffffff7f025485dc560b67fa9950386e7d44374265b739aa0ef8918e45feb997445e598790400e81a0a90106099ffc4061064fb95e437e5d5f0594c091b75999c66551d206c48cab1b787530de3629da0b37b211578542ae70ac9e8c0dbe754a77abd06ce2420a"], 0x50}}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0) 20:28:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c00020008"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:54 executing program 5: syz_emit_ethernet(0x83, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd601bfc97004d8800fe8000000000f4ffffffffffffff0000ff020000000000000000000000000001"], 0x0) 20:28:54 executing program 2: socket$packet(0x11, 0x3, 0x300) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x0) 20:28:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000003f02010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1298.654035][T18277] bond1: (slave veth285): Enslaving as an active interface with an up link [ 1298.747797][T18279] bond1 (unregistering): (slave veth285): Releasing backup interface [ 1298.781198][T18339] BPF:[2] Invalid btf_info:23f0000 20:28:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000004802010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:55 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='coredump_filter\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') r2 = getpid() tkill(r2, 0xf) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ptrace$setregs(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x50) [ 1298.813911][T18279] device veth285 left promiscuous mode [ 1298.823642][T18344] BPF:[2] Invalid btf_info:23f0000 [ 1299.034211][T18355] BPF:[2] Invalid btf_info:2480000 [ 1299.090525][T18359] BPF:[2] Invalid btf_info:2480000 [ 1299.373653][T18279] bond1 (unregistering): Released all slaves [ 1299.432589][T18342] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 1299.573937][T18342] device macsec1 entered promiscuous mode [ 1299.586705][T18342] device virt_wifi0 entered promiscuous mode [ 1299.631926][T18342] device virt_wifi0 left promiscuous mode [ 1299.968013][T18269] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 20:28:56 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) rt_sigaction(0xc, &(0x7f0000000180)={&(0x7f0000000100)="7c004e0f7eb6f0ae50030f1c62c166400f3a0fab0a00000004dfc5c4027d3fe566470f113b660f2f785f670f2ba80e0000002599899999", 0x4, &(0x7f0000000140)="f2df590bc46125767452e7875c3051c4e1f810f9c4e2fd1c43c1c1e3ab6546d3c63e42e200c402a947cdc4a2399ae3", {[0x1]}}, &(0x7f0000000240)={&(0x7f00000001c0)="c4a10dd5961d000000c481235c1cb42667f20f12f5f3436f42a4c4017c5aff3c2ac44178511e400f13ae00000000c481fc510b", 0x0, &(0x7f0000000200)="3e410f01d845894d07c461ff123bf0f69504000000c46331782f1ac44175facb460f6f14a9f0440fb32f450fe4167600"}, 0x8, &(0x7f0000000280)) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000001000050774740000dfdbdfa65501a381", @ANYRES32=0x0, @ANYBLOB="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", @ANYBLOB="6326ffc30340a59af4c3650421f9a5377986fc254ec2862883ce7257cd4f7ae2dcfdaef81c581d1b4223e49887ee68e87ed537d5b2e957e1fac165be3eb34c5174f6279277376cbe5d10966df793456b54921f664921e1615264cc762c189704152109b0dff9eb9ca92da732cc5b46ffffff7f025485dc560b67fa9950386e7d44374265b739aa0ef8918e45feb997445e598790400e81a0a90106099ffc4061064fb95e437e5d5f"], 0x50}}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0) [ 1300.058830][T18404] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 20:28:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10000015, 0x5, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 20:28:56 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[], 0x50}}], 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000540)=ANY=[@ANYBLOB="e0000001ac1414aa"], 0x1) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast1, @local}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000140)={0x6, {{0x2, 0x0, @multicast2}}}, 0x88) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000540)=""/197, &(0x7f0000000400)=0xffc4) 20:28:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000004c02010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c00020008"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1300.107922][T18404] device macsec1 entered promiscuous mode [ 1300.177373][T18404] device virt_wifi0 entered promiscuous mode [ 1300.194301][T18423] BPF:[2] Invalid btf_info:24c0000 [ 1300.244166][T18404] device virt_wifi0 left promiscuous mode [ 1300.777555][T18425] __nla_validate_parse: 6 callbacks suppressed [ 1300.777567][T18425] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1300.819412][T18425] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1300.865471][T18431] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 1301.064935][T18431] device macsec1 entered promiscuous mode [ 1301.088651][T18431] device virt_wifi0 entered promiscuous mode [ 1301.132410][T18431] device virt_wifi0 left promiscuous mode 20:28:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000006002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:57 executing program 2: syz_usb_connect(0x0, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="1201a80011f79e08070ada00488f000000010902240001000000000904120002c750dc000905850b0003000e0009050103"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1301.588702][T18443] netlink: 'syz-executor.4': attribute type 5 has an invalid length. 20:28:57 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[], 0x50}}], 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000540)=ANY=[@ANYBLOB="e0000001ac1414aa"], 0x1) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast1, @local}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000140)={0x6, {{0x2, 0x0, @multicast2}}}, 0x88) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000540)=""/197, &(0x7f0000000400)=0xffc4) 20:28:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:57 executing program 1: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) rt_sigaction(0xc, &(0x7f0000000180)={&(0x7f0000000100)="7c004e0f7eb6f0ae50030f1c62c166400f3a0fab0a00000004dfc5c4027d3fe566470f113b660f2f785f670f2ba80e0000002599899999", 0x4, &(0x7f0000000140)="f2df590bc46125767452e7875c3051c4e1f810f9c4e2fd1c43c1c1e3ab6546d3c63e42e200c402a947cdc4a2399ae3", {[0x1]}}, &(0x7f0000000240)={&(0x7f00000001c0)="c4a10dd5961d000000c481235c1cb42667f20f12f5f3436f42a4c4017c5aff3c2ac44178511e400f13ae00000000c481fc510b", 0x0, &(0x7f0000000200)="3e410f01d845894d07c461ff123bf0f69504000000c46331782f1ac44175facb460f6f14a9f0440fb32f450fe4167600"}, 0x8, &(0x7f0000000280)) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000001000050774740000dfdbdfa65501a381", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="6326ffc30340a59af4c3650421f9a5377986fc254ec2862883ce7257cd4f7ae2dcfdaef81c581d1b4223e49887ee68e87ed537d5b2e957e1fac165be3eb34c5174f6279277376cbe5d10966df793456b54921f664921e1615264cc762c189704152109b0dff9eb9ca92da732cc5b46ffffff7f025485dc560b67fa9950386e7d44374265b739aa0ef8918e45feb997445e598790400e81a0a90106099ffc4061064fb95e437e5d5f0594c091b75999c66551d206c48cab1b787530de3629da0b37b211578542ae70ac9e8c0dbe754a77abd06ce2420a"], 0x50}}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0) [ 1301.650532][T18443] device macsec1 entered promiscuous mode [ 1301.714973][T18443] device virt_wifi0 entered promiscuous mode [ 1301.763858][T18455] BPF:[2] Invalid btf_info:2600000 [ 1301.771045][T18443] device virt_wifi0 left promiscuous mode 20:28:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 1301.815333][T18459] BPF:[2] Invalid btf_info:2600000 20:28:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000006802010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1302.116690][T18472] BPF:[2] Invalid btf_info:2680000 [ 1302.162943][T18475] BPF:[2] Invalid btf_info:2680000 [ 1302.407781][T18431] syz-executor.4 (18431) used greatest stack depth: 23128 bytes left [ 1302.416176][T18452] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1302.450956][T18466] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 1302.518045][T18466] device macsec1 entered promiscuous mode [ 1302.555725][T18466] device virt_wifi0 entered promiscuous mode [ 1302.596311][T18466] device virt_wifi0 left promiscuous mode [ 1303.078998][T18452] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. 20:28:59 executing program 2: r0 = memfd_create(&(0x7f0000000900)='#\'%nodev\x00\x7f\xe5\xd0ql\x86\xcd\xe6\x14\x93\xb0\x7f_,y<', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000200), 0x87) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) ptrace(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x4000, 0x9}, 0x0) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='sched\x00') ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = open(&(0x7f0000000040)='./file0\x00', 0x3fc, 0x0) flock(r3, 0x1) sendmsg$IPSET_CMD_DEL(r3, &(0x7f0000000180)={&(0x7f0000000040), 0xc, 0x0}, 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="48d28b68767e3d133bede8e27745d6444551ff3db3e335d4921631bce5774dad1838718892fa7e322a8f9bba395a184ea645a0e1bf2fc904943f5cd3277e23dde65a180300d9c9d1cc02"], &(0x7f0000000080)='.', 0x0, 0x5010, 0x0) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r4, 0x0, 0x4, 0x0, 0x0) connect$inet(r4, &(0x7f0000000000), 0x10) 20:28:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000006c02010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:28:59 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[], 0x50}}], 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000540)=ANY=[@ANYBLOB="e0000001ac1414aa"], 0x1) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast1, @local}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000140)={0x6, {{0x2, 0x0, @multicast2}}}, 0x88) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000540)=""/197, &(0x7f0000000400)=0xffc4) 20:28:59 executing program 4: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) rt_sigaction(0xc, &(0x7f0000000180)={&(0x7f0000000100)="7c004e0f7eb6f0ae50030f1c62c166400f3a0fab0a00000004dfc5c4027d3fe566470f113b660f2f785f670f2ba80e0000002599899999", 0x4, &(0x7f0000000140)="f2df590bc46125767452e7875c3051c4e1f810f9c4e2fd1c43c1c1e3ab6546d3c63e42e200c402a947cdc4a2399ae3", {[0x1]}}, &(0x7f0000000240)={&(0x7f00000001c0)="c4a10dd5961d000000c481235c1cb42667f20f12f5f3436f42a4c4017c5aff3c2ac44178511e400f13ae00000000c481fc510b", 0x0, &(0x7f0000000200)="3e410f01d845894d07c461ff123bf0f69504000000c46331782f1ac44175facb460f6f14a9f0440fb32f450fe4167600"}, 0x8, &(0x7f0000000280)) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000001000050774740000dfdbdfa65501a381", @ANYRES32=0x0, @ANYBLOB="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", @ANYBLOB="6326ffc30340a59af4c3650421f9a5377986fc254ec2862883ce7257cd4f7ae2dcfdaef81c581d1b4223e49887ee68e87ed537d5b2e957e1fac165be3eb34c5174f6279277376cbe5d10966df793456b54921f664921e1615264cc762c189704152109b0dff9eb9ca92da732cc5b46ffffff7f025485dc560b67fa9950386e7d44374265b739aa0ef8918e45feb997445e598790400e81a0a90106099ffc4061064fb95e437e5d5f"], 0x50}}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0) 20:28:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:28:59 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$unix(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r2, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') 20:28:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000007402010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1303.282801][T18488] BPF:[2] Invalid btf_info:26c0000 20:28:59 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x87) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000040), 0x1c) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[], 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x4000282, 0xfc, 0x0) 20:28:59 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000880)="f1", 0x1}], 0x1, 0x1ff) [ 1303.390911][T18492] netlink: 'syz-executor.4': attribute type 5 has an invalid length. 20:28:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000007a02010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1303.490082][T18504] BPF:[2] Invalid btf_info:2740000 [ 1303.526472][T18510] BPF:[2] Invalid btf_info:2740000 20:28:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x24, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:29:00 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000880)="f1", 0x1}], 0x1, 0x1ff) [ 1303.790268][T18520] BPF:[2] Invalid btf_info:27a0000 [ 1303.807029][T18492] device macsec1 entered promiscuous mode [ 1303.842272][T18523] BPF:[2] Invalid btf_info:27a0000 20:29:00 executing program 2: r0 = memfd_create(&(0x7f0000000900)='#\'%nodev\x00\x7f\xe5\xd0ql\x86\xcd\xe6\x14\x93\xb0\x7f_,y<', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000200), 0x87) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) ptrace(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x4000, 0x9}, 0x0) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='sched\x00') ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = open(&(0x7f0000000040)='./file0\x00', 0x3fc, 0x0) flock(r3, 0x1) sendmsg$IPSET_CMD_DEL(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="640000000a06010100000000000000000000000148000880100007800c001940000000000000001f0c000780060004404e2000000c00078005000700040000000c00078008000640000003ff100007a2853b32c90c512a8000021940000000000000dc6d080009400000000101c7e257f0800e358c7742c025db4f30f3e4bd0fe800ee8ac6c400800000464090bde674611f0bcb842dde71e0ccceabfb3c6eebccbb3ce99df98ef3a7716711e6a83b143bccc428f25dcc8e7145d001000068d4d4ddff7fffff4ba348b4a5c92f7dd476792d322ede7629b8e92e6b1354515a5c08c541eaf51ab90b632cc3a1509943c73d6efdd4185cc5da99e276df2936b4424bc1fa6ae761e63bfafcb9cd92fef15500"/285], 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0xc040) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="48d28b68767e3d133bede8e27745d6444551ff3db3e335d4921631bce5774dad1838718892fa7e322a8f9bba395a184ea645a0e1bf2fc904943f5cd3277e23dde65a180300d9c9d1cc02"], &(0x7f0000000080)='.', 0x0, 0x5010, 0x0) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r4, 0x0, 0x4, 0x0, 0x0) connect$inet(r4, &(0x7f0000000000), 0x10) [ 1303.864654][T18492] device virt_wifi0 entered promiscuous mode 20:29:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000000000d102010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1304.001837][T18492] device virt_wifi0 left promiscuous mode 20:29:00 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000880)="f1", 0x1}], 0x1, 0x1ff) [ 1304.209047][T18532] BPF:[2] Invalid btf_info:2d10000 [ 1304.255960][T18535] BPF:[2] Invalid btf_info:2d10000 [ 1304.677833][T18498] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1304.700911][T18498] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. 20:29:01 executing program 4: syz_emit_ethernet(0x9e, &(0x7f00000002c0)=ANY=[@ANYBLOB="ffffffffffff00000000000086dd60a0f00900683affde80000000010000000000008f00000000ff"], 0x0) 20:29:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:29:01 executing program 2: socket$packet(0x11, 0x0, 0x300) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000012afe4)={0xa, 0xfffc, 0x0, @dev}, 0x1c) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x3000) 20:29:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000000fffff02010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:29:01 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000880)="f1", 0x1}], 0x1, 0x1ff) 20:29:01 executing program 1: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000300)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0) 20:29:01 executing program 4: openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup3(r1, r0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x2, 0x3, 0x268, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@pkttype={{0x28, 'pkttype\x00'}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x3}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'ipvlan1\x00', 'bond_slave_0\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c8) [ 1304.935565][T18554] BPF:[2] Invalid btf_info:2ffff0f 20:29:01 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x12) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000002c0)="e6a14c373e0613f12621dd2d7c7a52e8b23459a4c99c8c4f57e9538b17683300651e5cba5d43d7c8f2624ee799cd026628ead97ac18ffc65a3246cd0a866ae6f43831974fc8641", 0x47) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) accept(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x2343a726) ioctl$FS_IOC_RESVSP(r1, 0x40305839, &(0x7f0000000000)={0x0, 0x0, 0x3, 0x8000000}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x1d, &(0x7f0000000200)=0xffff660c, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0xc080661a, &(0x7f0000000180)={{0x0, 0x0, @descriptor="60a2361640d88a8d"}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) 20:29:01 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000b00)='nfs\x00', 0x0, &(0x7f0000000000)) 20:29:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000000000ffffff02010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:29:01 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000880)="f1", 0x1}], 0x1, 0x1ff) [ 1304.968786][T18557] BPF:[2] Invalid btf_info:2ffff0f [ 1305.044783][T18559] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1305.105952][T18559] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. 20:29:01 executing program 2: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r2) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="f00000001a00c9cd"], 0xf0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 1305.151544][T18572] NFS: Device name not specified 20:29:01 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000880)="f1", 0x1}], 0x1, 0x1ff) 20:29:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c00020008000500000000000800050000000000380003000500"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:29:01 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) io_setup(0x7ff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) 20:29:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000000001010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1305.191279][T18573] BPF:[2] Invalid btf_info:2ffffff [ 1305.210741][T18576] BPF:[2] Invalid btf_info:2ffffff [ 1305.218572][T18575] NFS: Device name not specified 20:29:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) 20:29:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000002000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:29:01 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) 20:29:01 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000880)="f1", 0x1}], 0x1, 0x1ff) [ 1305.398468][T18587] BPF:[3] Invalid kind:0 20:29:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1305.560511][T18603] BPF:[2] PTR (anon) 20:29:01 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, 0x0, 0x40002, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000880)="f1", 0x1}], 0x1, 0x1ff) [ 1305.602303][T18606] BPF:[2] PTR (anon) [ 1305.613638][T18603] BPF:type_id=1 20:29:01 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0) 20:29:01 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x2343a726) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x1d, &(0x7f0000000200), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r2, 0xc080661a, 0x0) [ 1305.643346][T18603] BPF: [ 1305.646356][T18606] BPF:type_id=1 [ 1305.664681][T18603] BPF:vlen != 0 [ 1305.671981][T18606] BPF: [ 1305.688392][T18603] BPF: [ 1305.688392][T18603] 20:29:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000003000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1305.693663][T18606] BPF:vlen != 0 [ 1305.710652][T18609] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1305.718831][T18606] BPF: [ 1305.718831][T18606] [ 1305.783990][T18609] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. 20:29:02 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, 0x0, 0x40002, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000880)="f1", 0x1}], 0x1, 0x1ff) [ 1305.899749][T18618] BPF:[2] PTR (anon) [ 1305.904186][T18618] BPF:type_id=1 [ 1305.919726][T18618] BPF: [ 1305.937940][T18618] BPF:vlen != 0 [ 1305.946630][T18622] BPF:[2] PTR (anon) [ 1305.963402][T18618] BPF: [ 1305.963402][T18618] [ 1305.974551][T18622] BPF:type_id=1 [ 1306.004626][T18622] BPF: [ 1306.020199][T18622] BPF:vlen != 0 [ 1306.056300][T18622] BPF: [ 1306.056300][T18622] 20:29:03 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8), 0x0) accept(r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x2343a726) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x0, &(0x7f0000000200)=0xffff660c, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0xc080661a, &(0x7f0000000180)={{0x0, 0x0, @descriptor="60a2361640d88a8d"}}) 20:29:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="1800000003000000000000000000000095002b0000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) recvmmsg(r2, &(0x7f0000003540)=[{{0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3b010000}}], 0x500, 0x5010012, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r0, r1}) sendmsg$rds(r2, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000003580)=""/4105, 0x1009}], 0x1}, 0x0) 20:29:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:29:03 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2aa48ee, &(0x7f0000000040)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x200000}}, {@journal_ioprio={'journal_ioprio'}}]}) 20:29:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000004000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:29:03 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, 0x0, 0x40002, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000880)="f1", 0x1}], 0x1, 0x1ff) [ 1306.848480][T18644] BPF:[2] PTR (anon) [ 1306.870231][T18647] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1306.875340][T18644] BPF:type_id=1 [ 1306.889577][T18651] BPF:[2] PTR (anon) 20:29:03 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000880)="f1", 0x1}], 0x1, 0x1ff) 20:29:03 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='hugetlbfs\x00', 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x28c6c, &(0x7f0000000000)=ANY=[@ANYBLOB='size=7%']) [ 1306.922989][T18644] BPF: [ 1306.930617][T18651] BPF:type_id=1 [ 1306.939717][T18647] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1306.988544][T18644] BPF:vlen != 0 [ 1306.993716][T18651] BPF: [ 1307.017428][T18644] BPF: [ 1307.017428][T18644] [ 1307.039686][T18651] BPF:vlen != 0 20:29:03 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x208200) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') 20:29:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000005000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:29:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1307.069316][T18651] BPF: [ 1307.069316][T18651] 20:29:03 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000180)='../file0\x00', 0x2) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) [ 1307.287619][T18666] BPF:[2] PTR (anon) [ 1307.312529][T18669] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1307.327120][T18670] BPF:[2] PTR (anon) [ 1307.331623][T18666] BPF:type_id=1 [ 1307.350074][T18666] BPF: [ 1307.355817][T18670] BPF:type_id=1 [ 1307.378921][T18666] BPF:vlen != 0 [ 1307.389544][T18670] BPF: [ 1307.404907][T18666] BPF: [ 1307.404907][T18666] [ 1307.421403][T18670] BPF:vlen != 0 [ 1307.425602][T18669] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1307.452651][T18670] BPF: [ 1307.452651][T18670] 20:29:04 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8), 0x0) accept(r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x2343a726) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x0, &(0x7f0000000200)=0xffff660c, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0xc080661a, &(0x7f0000000180)={{0x0, 0x0, @descriptor="60a2361640d88a8d"}}) 20:29:04 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000880)="f1", 0x1}], 0x1, 0x1ff) 20:29:04 executing program 2: sendmmsg$alg(0xffffffffffffffff, &(0x7f00000004c0)=[{0x0, 0x0, &(0x7f0000003a80)=[{&(0x7f0000000700)="1762a623cdcca2aaf0ed3a5118e661b81644b7d8d7c8e763f9c6b483cc72794e5dca588d041d290bac4cb702a4564b2c533649fddcd47a5785ea54af01d20bf255c7fe678dac3de5b7e6db1d29ccc64f465a16ceead2a670b9e5487a3b7adb82662414e3b40e09fc17cdb479e67e78660a7c71684fa574de370f3af6804c763b491a7c00ff030478bec6fbeadfa7995304b7ccea4a9ce7cbb1c83655a7f234eafc289ba430e9087e82efc33429d6c88dd27efe7c3fafc0e5dd2d110941280be8ef16a18ba4fe2948814d2ac3718d187b7cf46b02a4219107d38a18c30b254d521669582498fcf73151f70d30fd3e3e9d8f7aeb1dc0e1578e302ab95ed3d6912e57582e52da0d591f1d1885c89ce049b89a0547b03fcd1210795649294a1acf3688f700ed23e923958f2832de432a8ba97c7a22a70c806857477b8eca250e4bd8e2369db302925da51fbc3df85e94d2351c977a54288a8ef2a6daed24a70dce6c1fe0735d3f4c5a5d1fac0e3cdc6772f82d80a8c7547df63f03dfca53f42bf323d6700eb914c3732d2d2fddd2587f47b3c78bf47b434748e1be8f038ca6828934d31a216a1c5505ee7d3b4e49f83c4cb6d0ece46fc0be8938e351ec5c667f3650d329e01f981082df9cd783549e611c2a916ac013bc6b40802398ace9f5c026c40eba7d5db2069e660137394c4c8324ffe37d1ab2fdab7de061711b5751f18864f9b526110fb79e6b3a34423cbccb89e61d9d887cd76f798d09be1f211c6c2f7660418e2fd2c298800de7388020b5ba190fbe7a4beebd9e79f3c5e5b13a55e882b63922779485ac54c8f605e356834e5cb4b0947d0c865311441b6f4a9cc526e997c2bb4820cb357fdfe12b050b08c6e4b1d6b84a2627af5324d42fdbae55b6d0c2850eace57e88a38cbae16faa4057465a1f6eea8d8f1bf91882dfdfa564729c7bc5f28227802c00c899ad2c586dd2cf8feae90b3cc3c5bed3c5b589c4d3bfb2dbe5cf997ecabba10697cbd3dadee541cd449130c50defbaefd7cd04a1159c65440d6bbf17c0e4fe461e828c908e132b7bdba4c8f999d24f2e378de13e816d20287f214a9b052a00cf24a5442d1a7e5be2f83166c0cf9c7b994b3e8364c7b479fdbe282c7b01b8fadb348190af34e8ab6acb44335163ca6c0b26ab43a66d07d08267e21248e6eef07101f5e3ef78f378fca156e259ec14dc7f8255d9bae8b1a5b4e2036e8b65a6702ac9e40c2be57dc0eede72fb1632dbaed6280a7520da3f4fdcb1c4dc334abd3e7c56b2730539ff334ae52d1a2d4dd5d01e1a85077ef618397cf8d2717ceb353ab5557b3d7477998e34f51a1b0cb672d3dab6be553a27daf1af024729579620e56ae20191f137ccec3383ad24167409be80d0eabffecd02bcb2dbfea6f4393b1de9cdaa2284e8c863f13988ae075fa2a28e4aab290e1ac2e7459d45c11eff874f8a7d81851e8b383e0d0cefe209253e0d52bc810cc3646b5284c217ca7743af39531da0dde480f245e3bdd2e498bb81db93881d7651d5f9f666e829f63aefcacba34572f8c7ca6cea4d9d1adfbec6c750618c5847d478dcec2d23b26599f7584e10c2be12a444cecf433d5fdadd04f3af2f49eb01795a5bdd017d0e44bdaeb3e9950fa92a2bdaf44e0d57fdb299d2c3b1036107ecc8eebcb56c6c5dc19fd9a19ec724fedb8acc52ccea1175dff7d0fc7956259f17029a613150f03d3be6413552b406bcca5e000c8bc8674c6d5006ea44b99abeb0e7a8078f71413092a39f1896796240950056135ddb20c68b350f3253a0c9ac4f8af6854329e4bbb02f345f6a3c3c770397e1e951d22fa88184e4bd5b1440074659dd3e1424dda56dacc4c744a51d8f5beba9a6399716f3dcd866fd9f10212141f281e637534f7de9a57cb9c8f91614ae04650075d10bb1238f0c3ef9033126b17a35eb946a6fe8b6e5e8c6977507d1856152d3bfe45f8973353673f19a4f4523da58becb8e6c6adadc95fecfe4b0d99a356106c6a945b15fa8871bbe0f40524f9732ab77b6ef6a459988c234b2f845f765bb66b957c34fb6aeb3b521201cfdb9c33c7207afed7f00449d4126433a32cbfd805a4f10c3eb536ec1f00c7abe7bdca49d4fe93d8c4480b70e454f9a6c0ec3eae7db52749f5c5ee0786f37b0fe69be8b19909055ae9243776b4ae8a81c0621c72485ba3944ffc867a1083920fb91b12b71d2985419580018a4ca283d16d1f97e25c97198d201bbe2b682481490dd8e29ee65591495bce7151384e66cbb47a52abbe5d870dcfd8549471f4812a44023c8c74d461216cdd022175cc97685b6443cb273f9a05952f1dc23f61853f61494eacda45782fc2a00b6e56fc60e3b2c2aa4cd9ea289605002955d70925701272b6f2f586cafd23beb4f7353be0382381a1a031def14d1cf280c60d824c00b3f1a6f42a893dc0929e9ad0602c6e3df2fa1fd920bb5450fc85c05384d706f2e3bac25585e5bcd1e08a90221ab851b24e9a7b798eb5c403a3fdd527bbf48c8a259d6b2a69d48bed160fc378217365bafdaf38bdde67aa1cb8d891474e4a00d483409bb2855d5aa767fe50a9df3bc3fdcc5efb137fc9a00a087a90702e883c2fcc7b9a185b53bb3c964a45bfa4cfbaa5525dde53d4c417adb21f2f6486724b0190bd29cb0ff0ebc2c8d2cb9a9b25c8489a8d704b1191f75ba9851b4e07271097ecc10217ac798d646c6feb6a3679b35e351003e90063c6e75d90267b38480e7307d1eac8a04f1f1074af67f4f266aa86caf2c9070a4297860f5caf88d6c57f02933b24f05988769fc87b511d2f84d2c9191a16d42028df3657c5f1f20f79d15290209fabb5e9921afe9a4f20407312149c8710e2b1f07a07e7eb1311de0bac66e7380d96210a24caa80d86615af72410d99bf92185ff40b0e880fb0eda3375358689e2ffde5966821ccd227559a28db401331891578659996caeea7faa96e7bbbb96a8c01203a2744213fb74c6883f0d0bfb1a07cd729da0f27451dca32fdfa1413b0f775cea1ef0c1f985d41301041b63bd2f6216a3853bbf4f4cec1e2d258153bd349d7496d39cebab0f67e08b088db774a35ebec5f6ad801a8b438eb7c2c13727beea4e91bd12a5def16eb9af13b2fd6a7d9916274cdee8c933d9f97380ee88f78f3deb7b640463018e25457e3dca66e7065c3fe39e1bbee63d807eb4b4340267b6e129a858a1d6632448fe706d94154a7d6985ee8f972b27f0263965f33487538a06698cedadb69ce2485dce33cff888e84f75c24731bd28c393e3a707d812708023bac3cfd35f73615b2b3861783fa66303ab32aa5317ed20a75c60a5617ec3889e7714584a13fcd105280c49264637003785e6174662273ba7795302549a772573dc496fb3b0c5fc734018dadd4079e8eddf06f6d7c95330c42e23d5875c0f6fb4cf715afd2a1ff91c17e22af1e04ed0b46724a0ec177c1b2df02cbac4f9518cfeb26a028cf7d5ca3013496d151f058b83ae563f7f21d53377e104a0b46017357d89f1fa15a1b453df0fc1cc2b7c094290dfd2d71d897e5f854c66162a9b68fea2d5bd57fa7b9a40740a3212f9541650c754e08fa6320cde6c80fcf36565f0031db894fef446932ce28cd3ecbe37506a94490112fd0a6615c91dccc0d70b2d7931d7fc521fbd0e35f328b66020e22944b04c89fa17a9417570d50c9b01a8df4228fd4d5da8ed670d612a7e7541f89fa64a9ef11c4035371eaf00d473206e53dd3131aaa0bf43f88896ae9d63dbf083a8ab732d0a5844abc4d6a6c55e61572379c747359913a4ebd88a76abd7e6ca6490b74b291ab7ac149fa3a30fade698891ee2c80998e2f002f0e1a62f29c6c003595a71500af50149a27d5fe2faae502e8ce86dcd470168b7b95678e51014619f895c211f2db964ee90720c25431fd8b0a6c737b37fb2b888e6401054e3cd9f3ec7ad78cc6ad814f6eddf3bdcf34a1102f09f6911f33575337b880ba4bfe0dfd39919450563e7bd8a7d16661dc275b5b69e460fbd05760e888b6b375b9737be0189a925660810f5ea9eb4a7dcfa7298a91a6e68953bc08add8a63e14290b04c1648c8077cd488c0dd9d36c71da30ca572961fc77c9ed2dd177f6c7d44a47ba946a3430378ec6de8179c6c3da665765c80a7536f32f", 0xb80}], 0x1}], 0x1, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x16c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000001ac0)=[&(0x7f0000000e40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\xed\x02\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001040)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001280)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a']) 20:29:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000006000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:29:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c00020008000500000000000800050000000000380003"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:29:04 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) [ 1308.363400][T18687] BPF:[2] PTR (anon) 20:29:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c00020008000500000000000800050000000000380003"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:29:04 executing program 2: 20:29:04 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000880)="f1", 0x1}], 0x1, 0x1ff) [ 1308.398194][T18687] BPF:type_id=1 [ 1308.402304][T18695] BPF:[2] PTR (anon) [ 1308.417682][T18687] BPF: [ 1308.423597][T18695] BPF:type_id=1 [ 1308.439296][T18687] BPF:vlen != 0 20:29:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000007000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1308.461472][T18695] BPF: [ 1308.470152][T18687] BPF: [ 1308.470152][T18687] [ 1308.475975][T18695] BPF:vlen != 0 [ 1308.491842][T18695] BPF: [ 1308.491842][T18695] 20:29:04 executing program 2: 20:29:04 executing program 5: openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000880)="f1", 0x1}], 0x1, 0x1ff) [ 1308.672714][T18708] BPF:[2] PTR (anon) [ 1308.728993][T18708] BPF:type_id=1 [ 1308.732529][T18708] BPF: [ 1308.735437][T18708] BPF:vlen != 0 [ 1308.784319][T18708] BPF: [ 1308.784319][T18708] 20:29:05 executing program 4: 20:29:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c00020008000500000000000800050000000000380003"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:29:05 executing program 2: 20:29:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000008000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:29:05 executing program 5: openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000880)="f1", 0x1}], 0x1, 0x1ff) 20:29:05 executing program 1: [ 1309.435833][T18729] BPF:[2] PTR (anon) 20:29:05 executing program 5: openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000880)="f1", 0x1}], 0x1, 0x1ff) 20:29:05 executing program 2: [ 1309.467740][T18729] BPF:type_id=1 [ 1309.480931][T18732] BPF:[2] PTR (anon) [ 1309.502664][T18732] BPF:type_id=1 20:29:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030005"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:29:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000000a000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:29:05 executing program 2: [ 1309.515758][T18729] BPF: [ 1309.530267][T18732] BPF: [ 1309.542180][T18732] BPF:vlen != 0 [ 1309.543749][T18729] BPF:vlen != 0 [ 1309.553811][T18732] BPF: [ 1309.553811][T18732] [ 1309.597929][T18729] BPF: [ 1309.597929][T18729] 20:29:05 executing program 1: [ 1309.729860][T18746] BPF:[2] PTR (anon) [ 1309.754823][T18746] BPF:type_id=1 [ 1309.760000][T18748] BPF:[2] PTR (anon) [ 1309.773314][T18746] BPF: [ 1309.781987][T18748] BPF:type_id=1 [ 1309.789308][T18746] BPF:vlen != 0 [ 1309.804836][T18748] BPF: [ 1309.812468][T18746] BPF: [ 1309.812468][T18746] [ 1309.822071][T18748] BPF:vlen != 0 [ 1309.838081][T18748] BPF: [ 1309.838081][T18748] 20:29:06 executing program 4: 20:29:06 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(r0, 0x0, 0x0, 0x1ff) 20:29:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:29:06 executing program 2: 20:29:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000024000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:29:06 executing program 1: [ 1310.034725][T18759] BPF:[2] PTR (anon) [ 1310.071314][T18764] BPF:[2] PTR (anon) [ 1310.090401][T18759] BPF:type_id=1 20:29:06 executing program 2: 20:29:06 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(r0, 0x0, 0x0, 0x1ff) [ 1310.116230][T18764] BPF:type_id=1 [ 1310.127396][T18759] BPF: 20:29:06 executing program 1: 20:29:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:29:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000030000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1310.165862][T18764] BPF: [ 1310.172257][T18759] BPF:vlen != 0 [ 1310.192054][T18764] BPF:vlen != 0 [ 1310.199490][T18759] BPF: [ 1310.199490][T18759] 20:29:06 executing program 4: [ 1310.219620][T18764] BPF: [ 1310.219620][T18764] 20:29:06 executing program 2: 20:29:06 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(r0, 0x0, 0x0, 0x1ff) 20:29:06 executing program 4: 20:29:06 executing program 1: 20:29:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c0002000800050000000000080005000000000038000300"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1310.436366][T18778] BPF:[2] PTR (anon) [ 1310.454868][T18778] BPF:type_id=1 [ 1310.472262][T18780] BPF:[2] PTR (anon) [ 1310.481582][T18778] BPF: 20:29:06 executing program 2: [ 1310.492424][T18780] BPF:type_id=1 [ 1310.497220][T18778] BPF:vlen != 0 [ 1310.511372][T18780] BPF: [ 1310.515610][T18778] BPF: [ 1310.515610][T18778] [ 1310.527142][T18780] BPF:vlen != 0 20:29:06 executing program 4: 20:29:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000037000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1310.548562][T18780] BPF: [ 1310.548562][T18780] 20:29:06 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(r0, &(0x7f0000000240), 0x0, 0x1ff) 20:29:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030005"], 0x7c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:29:06 executing program 1: [ 1310.728012][T18795] BPF:[2] PTR (anon) 20:29:07 executing program 2: [ 1310.754682][T18795] BPF:type_id=1 [ 1310.762598][T18798] BPF:[2] PTR (anon) [ 1310.776384][T18795] BPF: [ 1310.783212][T18798] BPF:type_id=1 [ 1310.797054][T18795] BPF:vlen != 0 20:29:07 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(r0, &(0x7f0000000240), 0x0, 0x1ff) 20:29:07 executing program 4: [ 1310.807170][T18798] BPF: [ 1310.818066][T18795] BPF: [ 1310.818066][T18795] [ 1310.827049][T18798] BPF:vlen != 0 20:29:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000048000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1310.853536][T18798] BPF: [ 1310.853536][T18798] 20:29:07 executing program 1: [ 1310.881638][T18802] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. 20:29:07 executing program 2: [ 1310.942786][T18802] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. 20:29:07 executing program 4: [ 1311.021101][T18807] BPF:[2] PTR (anon) 20:29:07 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(r0, &(0x7f0000000240), 0x0, 0x1ff) [ 1311.050162][T18807] BPF:type_id=1 [ 1311.054662][T18811] BPF:[2] PTR (anon) [ 1311.083595][T18807] BPF: [ 1311.095738][T18811] BPF:type_id=1 20:29:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030005"], 0x7c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1311.106697][T18807] BPF:vlen != 0 20:29:07 executing program 1: [ 1311.127282][T18811] BPF: [ 1311.135696][T18807] BPF: [ 1311.135696][T18807] [ 1311.148569][T18811] BPF:vlen != 0 20:29:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000004c000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1311.169701][T18811] BPF: [ 1311.169701][T18811] 20:29:07 executing program 2: 20:29:07 executing program 4: [ 1311.283310][T18820] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. 20:29:07 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(r0, &(0x7f0000000240)=[{0x0}], 0x1, 0x1ff) 20:29:07 executing program 1: [ 1311.329867][T18820] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. 20:29:07 executing program 2: [ 1311.418038][T18825] BPF:[2] PTR (anon) 20:29:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030005"], 0x7c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1311.443673][T18825] BPF:type_id=1 [ 1311.459008][T18829] BPF:[2] PTR (anon) [ 1311.463128][T18825] BPF: [ 1311.474826][T18825] BPF:vlen != 0 20:29:07 executing program 4: 20:29:07 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(r0, &(0x7f0000000240)=[{0x0}], 0x1, 0x1ff) [ 1311.492976][T18829] BPF:type_id=1 [ 1311.496405][T18825] BPF: [ 1311.496405][T18825] [ 1311.528036][T18829] BPF: [ 1311.547190][T18829] BPF:vlen != 0 20:29:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000060000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1311.568072][T18829] BPF: [ 1311.568072][T18829] 20:29:07 executing program 2: 20:29:07 executing program 1: [ 1311.677300][T18840] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. 20:29:07 executing program 4: 20:29:08 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(r0, &(0x7f0000000240)=[{0x0}], 0x1, 0x1ff) [ 1311.723486][T18840] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1311.761624][T18845] BPF:[2] PTR (anon) 20:29:08 executing program 2: [ 1311.787868][T18845] BPF:type_id=1 [ 1311.807097][T18845] BPF: [ 1311.815584][T18847] BPF:[2] PTR (anon) [ 1311.822839][T18845] BPF:vlen != 0 20:29:08 executing program 1: [ 1311.842393][T18847] BPF:type_id=1 [ 1311.845684][T18845] BPF: [ 1311.845684][T18845] [ 1311.868789][T18847] BPF: 20:29:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030005"], 0x7c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:29:08 executing program 4: 20:29:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000068000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1311.896418][T18847] BPF:vlen != 0 [ 1311.916459][T18847] BPF: [ 1311.916459][T18847] 20:29:08 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000880)}], 0x1, 0x1ff) 20:29:08 executing program 2: 20:29:08 executing program 1: 20:29:08 executing program 4: 20:29:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030005"], 0x7c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1312.196990][T18861] BPF:[2] PTR (anon) 20:29:08 executing program 2: [ 1312.226082][T18861] BPF:type_id=1 [ 1312.227682][T18867] BPF:[2] PTR (anon) [ 1312.234048][T18867] BPF:type_id=1 [ 1312.257228][T18861] BPF: 20:29:08 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000880)}], 0x1, 0x1ff) 20:29:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000006c000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:29:08 executing program 1: [ 1312.288272][T18861] BPF:vlen != 0 [ 1312.300623][T18867] BPF: [ 1312.307173][T18861] BPF: [ 1312.307173][T18861] [ 1312.327434][T18867] BPF:vlen != 0 [ 1312.350476][T18867] BPF: [ 1312.350476][T18867] 20:29:08 executing program 4: 20:29:08 executing program 2: 20:29:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030005"], 0x7c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:29:08 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000880)}], 0x1, 0x1ff) 20:29:08 executing program 1: 20:29:08 executing program 4: [ 1312.593565][T18883] BPF:[2] PTR (anon) 20:29:08 executing program 2: [ 1312.632626][T18883] BPF:type_id=1 [ 1312.639787][T18886] BPF:[2] PTR (anon) [ 1312.663526][T18886] BPF:type_id=1 [ 1312.679717][T18883] BPF: [ 1312.682616][T18883] BPF:vlen != 0 [ 1312.685468][T18886] BPF: [ 1312.707471][T18886] BPF:vlen != 0 20:29:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030005"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:29:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000074000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:29:09 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000880)="f1", 0x1}], 0x1, 0x0) [ 1312.731778][T18886] BPF: [ 1312.731778][T18886] [ 1312.737151][T18883] BPF: [ 1312.737151][T18883] 20:29:09 executing program 1: 20:29:09 executing program 4: r0 = memfd_create(&(0x7f0000000900)='#\'%nodev\x00\x7f\xe5\xd0ql\x86\xcd\xe6\x14\x93\xb0\x7f_,y<', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000080)='.', 0x0, 0x5010, 0x0) 20:29:09 executing program 2: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmsg$OSF_MSG_ADD(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)={0x268, 0x0, 0x5, 0x0, 0x0, 0x0, {}, [{{0x254, 0x1, {{0x1}, 0x0, 0x81, 0x1, 0x0, 0x14, 'syz1\x00', "8b5eeabbc33211c6223f1abfeb01c6df47245417d912c16a87a50e477999c0ed", "d0ac70080949661c4ef796225a088faad51d6a88cdfa1a9b0e0e84ddfb6368a5", [{0xb7, 0x7, {0x0, 0x211a}}, {0x6, 0x4, {0x2}}, {0xffa0, 0x8, {0x0, 0x8}}, {0x8, 0xfffb, {0x2, 0x5}}, {0x4, 0x5, {0x0, 0x1}}, {0x1ff, 0x5, {0x3, 0x9}}, {0x3, 0x1, {0x0, 0x8}}, {0x0, 0x8, {0x0, 0x5}}, {0x1, 0x0, {0x3, 0x81}}, {0x3, 0xe8c, {0x2, 0xff0a}}, {0x8000, 0x7fff, {0x2, 0x40}}, {0x6, 0x126d, {0x0, 0x5ff}}, {0x7, 0xec, {0x3, 0x4}}, {0x6, 0xf800, {0x2, 0xffffffa9}}, {0x4, 0x8, {0x2, 0x5}}, {0x0, 0x6}, {0x5a, 0x0, {0x2901f2f12acf9a72, 0x3f}}, {0x9, 0x6}, {}, {0x0, 0x8, {0x0, 0xef6a}}, {0x9, 0x10, {0x3, 0x3f}}, {0xfffb, 0x6}, {}, {0x9, 0x0, {0x1, 0xffff}}, {0x3, 0xf800, {0x0, 0x4}}, {0x0, 0x0, {0x2}}, {0x9, 0x0, {0x0, 0x1}}, {0x20, 0x7, {0x2}}, {0xfff, 0x0, {0x1, 0xfffffffd}}, {0x0, 0x4}, {0x1ff, 0x6}, {0x0, 0x3da0, {0x0, 0x8000}}, {0x0, 0x0, {0x0, 0x2}}, {0x3, 0x1, {0x3, 0x6}}, {0xd5, 0x694, {0x2, 0x9}}, {0xc1a, 0x401, {0x2, 0x4}}, {0x0, 0xffb0}, {0x7, 0x0, {0x3, 0x1f}}, {0x0, 0x658, {0x0, 0x1}}, {0x1, 0x18}]}}}]}, 0x268}, 0x1, 0x0, 0x0, 0x200400c1}, 0x840) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6100) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r4, 0x8200) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000001000)) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r4, &(0x7f00000006c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x0) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:29:09 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000880)="f1", 0x1}], 0x1, 0x0) 20:29:09 executing program 1: 20:29:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030005"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1312.998764][T18902] BPF:[2] PTR (anon) [ 1313.016526][T18902] BPF:type_id=1 [ 1313.034512][T18902] BPF: 20:29:09 executing program 2: [ 1313.049551][T18902] BPF:vlen != 0 [ 1313.066136][T18902] BPF: [ 1313.066136][T18902] [ 1313.082278][T18908] BPF:[2] PTR (anon) [ 1313.101696][T18908] BPF:type_id=1 [ 1313.130599][T18908] BPF: [ 1313.150820][T18908] BPF:vlen != 0 20:29:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404000000000000007a000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1313.180947][T18908] BPF: [ 1313.180947][T18908] 20:29:09 executing program 1: 20:29:09 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x40002, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000880)="f1", 0x1}], 0x1, 0x0) 20:29:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030005"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:29:09 executing program 2: [ 1313.414543][T18922] BPF:[2] PTR (anon) [ 1313.449898][T18922] BPF:type_id=1 [ 1313.455380][T18925] BPF:[2] PTR (anon) [ 1313.478020][T18922] BPF: [ 1313.490507][T18925] BPF:type_id=1 20:29:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f00000002c0)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000240)={[{@max_batch_time={'max_batch_time'}}]}) [ 1313.504662][T18922] BPF:vlen != 0 [ 1313.518207][T18925] BPF: [ 1313.531133][T18922] BPF: [ 1313.531133][T18922] [ 1313.540050][T18925] BPF:vlen != 0 [ 1313.558371][T18925] BPF: [ 1313.558371][T18925] 20:29:10 executing program 4: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fstatfs(r0, &(0x7f0000000280)=""/24) 20:29:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000000000d1000002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:29:10 executing program 5: syz_open_dev$rtc(&(0x7f0000000140)='/dev/rtc#\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) close(r0) 20:29:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) 20:29:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030005"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:29:10 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x30b) write$tun(r3, &(0x7f00000000c0)={@void, @val={0x1}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0xf98, 0x3a, 0x0, @remote, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "3289e4", 0x0, 0x0, 0x0, @local, @rand_addr=' \x01\x00', [], "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"}}}}}}, 0xfca) [ 1314.066465][T18945] BPF:[2] PTR (anon) 20:29:10 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 1314.095434][T18945] BPF:type_id=1 [ 1314.107694][T18952] BPF:[2] PTR (anon) [ 1314.129904][T18945] BPF: 20:29:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030005"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1314.161319][T18952] BPF:type_id=1 [ 1314.165352][T18945] BPF:vlen != 0 [ 1314.185131][T18952] BPF: [ 1314.191061][T18945] BPF: [ 1314.191061][T18945] [ 1314.211620][T18952] BPF:vlen != 0 20:29:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000030002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1314.233625][T18952] BPF: [ 1314.233625][T18952] 20:29:10 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp\x00') socket$inet_udp(0x2, 0x2, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r1 = socket(0x400020000000010, 0x3, 0x0) dup2(r1, r0) 20:29:10 executing program 2: r0 = open(0x0, 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440)={0x8, {"0000051a00"}}, 0xfffffc41) open(&(0x7f0000000180)='./bus\x00', 0x14103e, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) sysfs$1(0x1, &(0x7f0000000000)='mime_type{\x00') r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004800)=[{{&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000d00)=""/4096, 0x1000}, {0x0}, {&(0x7f0000000700)=""/166, 0xa6}, {&(0x7f00000003c0)=""/93, 0x5d}, {&(0x7f00000002c0)=""/62, 0x3e}, {&(0x7f00000007c0)=""/165, 0xa5}, {&(0x7f0000001d00)=""/4096, 0x1000}], 0x7, &(0x7f00000004c0)=""/58, 0x3a}}, {{&(0x7f0000002f40)=@alg, 0x80, &(0x7f0000004180)=[{0x0}, {&(0x7f0000000b40)=""/210, 0xd2}, {&(0x7f0000004100)=""/110, 0x6e}], 0x3}}, {{0x0, 0x0, &(0x7f00000045c0)=[{0x0}, {&(0x7f00000001c0)=""/21, 0x15}, {&(0x7f0000004480)}, {&(0x7f000000a080)=""/102400, 0x19000}, {0x0}], 0x5}}, {{0x0, 0x0, &(0x7f0000004780)}, 0x8}], 0x4, 0x1, 0x0) 20:29:10 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x70ad}, 0x40800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x424, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xb2d8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r1, 0x0, 0x320f) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000000)=@v1={0x0, @adiantum, 0x1, "5068b89c29574228"}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0), 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x24cc00, 0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x28}, 0x1, 0x0, 0x0, 0x20000080}, 0x4c841) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, 0x0, 0x0) [ 1314.427571][T18971] BPF:[2] PTR (anon) 20:29:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030005"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1314.449398][T18971] BPF:type_id=1 [ 1314.460816][T18973] BPF:[2] PTR (anon) [ 1314.471559][T18971] BPF: [ 1314.480878][T18973] BPF:type_id=1 [ 1314.530373][T18971] BPF:vlen != 0 20:29:10 executing program 5: syz_open_dev$rtc(&(0x7f0000000140)='/dev/rtc#\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) close(r0) [ 1314.556994][T18973] BPF: [ 1314.567844][T18971] BPF: [ 1314.567844][T18971] [ 1314.603227][T18973] BPF:vlen != 0 20:29:10 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x70ad}, 0x40800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x424, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xb2d8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r1, 0x0, 0x320f) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000000)=@v1={0x0, @adiantum, 0x1, "5068b89c29574228"}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0), 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x24cc00, 0x0) syz_genetlink_get_family_id$fou(0x0) 20:29:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000050002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1314.626579][T18973] BPF: [ 1314.626579][T18973] 20:29:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c9809", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030005"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:29:11 executing program 5: syz_open_dev$rtc(&(0x7f0000000140)='/dev/rtc#\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) open(&(0x7f0000000080)='.\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) close(r0) [ 1314.917964][T18991] BPF:[2] PTR (anon) 20:29:11 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000100)) [ 1314.945071][T18991] BPF:type_id=1 [ 1314.958431][T18995] BPF:[2] PTR (anon) [ 1314.972173][T18995] BPF:type_id=1 [ 1314.981279][T18991] BPF: [ 1315.007868][T18991] BPF:vlen != 0 [ 1315.020292][T18995] BPF: [ 1315.035966][T18991] BPF: [ 1315.035966][T18991] 20:29:11 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000001300)={r2, 0x3, 0x1}, 0x10) socket$alg(0x26, 0x5, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) 20:29:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000060002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1315.056300][T19001] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1315.069251][T18995] BPF:vlen != 0 [ 1315.084137][T18995] BPF: [ 1315.084137][T18995] [ 1315.186105][T19001] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1315.313516][T19009] BPF:[2] PTR (anon) [ 1315.367434][T19009] BPF:type_id=1 [ 1315.376616][T19012] BPF:[2] PTR (anon) [ 1315.388848][T19009] BPF: [ 1315.396662][T19012] BPF:type_id=1 20:29:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f00000000c0)=@ethtool_cmd={0x7}}) 20:29:11 executing program 2: r0 = memfd_create(&(0x7f0000000900)='#\'%nodev\x00\x7f\xe5\xd0ql\x86\xcd\xe6\x14\x93\xb0\x7f_,y<', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000080)='.', 0x0, 0x5010, 0x0) 20:29:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c9809", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030005"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:29:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000070002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1315.416528][T19009] BPF:vlen != 0 [ 1315.428795][T19012] BPF: [ 1315.433965][T19009] BPF: [ 1315.433965][T19009] [ 1315.445537][T19012] BPF:vlen != 0 [ 1315.457908][T19012] BPF: [ 1315.457908][T19012] 20:29:11 executing program 1: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmsg$OSF_MSG_ADD(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)={0x268, 0x0, 0x5, 0x0, 0x0, 0x0, {}, [{{0x254, 0x1, {{0x1}, 0x0, 0x81, 0x1, 0x0, 0x14, 'syz1\x00', "8b5eeabbc33211c6223f1abfeb01c6df47245417d912c16a87a50e477999c0ed", "d0ac70080949661c4ef796225a088faad51d6a88cdfa1a9b0e0e84ddfb6368a5", [{0xb7, 0x7, {0x0, 0x211a}}, {0x6, 0x4, {0x2, 0x406}}, {0xffa0}, {0x8, 0xfffb, {0x0, 0x5}}, {0x4, 0x5}, {0x1ff, 0x0, {0x3, 0x9}}, {0x0, 0x0, {0x0, 0x8}}, {0x0, 0x0, {0x3, 0x5}}, {0x1, 0x0, {0x0, 0x81}}, {0x3, 0x0, {0x2, 0xff0a}}, {0x0, 0x7fff, {0x2, 0x40}}, {0x0, 0x126d, {0x0, 0x5ff}}, {0x0, 0xec, {0x0, 0x4}}, {0x6, 0x0, {0x2, 0xffffffa9}}, {0x4, 0x0, {0x0, 0x5}}, {0x0, 0x6}, {0x5a, 0x0, {0x0, 0x3f}}, {0x9, 0x6, {0x1}}, {0x2, 0x0, {0x0, 0xffffffff}}, {0x0, 0x8, {0x0, 0xef6a}}, {0x0, 0x10, {0x3, 0x3f}}, {0xfffb, 0x6}, {0x0, 0x800}, {0x9, 0xffff, {0x1, 0xffff}}, {0x3, 0xf800, {0x0, 0x4}}, {}, {0x9, 0x0, {0x0, 0x1}}, {0x0, 0x0, {0x2}}, {0xfff, 0x0, {0x1, 0xfffffffd}}, {0x0, 0x4, {0x1}}, {0x1ff, 0x0, {0x3, 0x1ae00}}, {0x0, 0x3da0}, {0x0, 0x0, {0x0, 0x2}}, {0x0, 0x1}, {0xd5, 0x0, {0x2, 0x9}}, {0xc1a, 0x401}, {0x3, 0xffb0, {0x0, 0x1}}, {0x7, 0x0, {0x3, 0x1f}}, {0x0, 0x658, {0x0, 0x1}}, {0x1, 0x18, {0x0, 0x8}}]}}}]}, 0x268}, 0x1, 0x0, 0x0, 0x200400c1}, 0x840) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000005c0)) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6100) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r4, 0x8200) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000001000)) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r4, &(0x7f00000006c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x34, 0x0, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xde}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x9}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:29:11 executing program 2: sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="500000000000000000000000000000006ea7fa043a8ab9a5a10b4aed73b87c50272ed83532707778740d40f7795c8a0dd2ee3dc4c408a7a83ae12e83c36c43b48a2547a8a305361b6474ed"], 0x50}}], 0x1, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000540)=ANY=[@ANYBLOB="e0000001ac1414aa"], 0x1) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast1, @local}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000140)={0x6, {{0x2, 0x0, @multicast2}}}, 0x88) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000540)=""/197, &(0x7f0000000400)=0xffc4) [ 1315.645894][T19027] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1315.659657][T19028] BPF:[2] PTR (anon) 20:29:11 executing program 5: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) [ 1315.691204][T19034] BPF:[2] PTR (anon) [ 1315.713852][T19028] BPF:type_id=1 [ 1315.715676][T19034] BPF:type_id=1 [ 1315.737666][T19028] BPF: [ 1315.741331][T19034] BPF: [ 1315.748356][T19027] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1315.757864][T19034] BPF:vlen != 0 20:29:12 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdb, 0x9c9}, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000140)=[{&(0x7f0000000500)="8d", 0x1}], 0x1, 0x0) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f00000002c0)=0x7, 0x4) socket$alg(0x26, 0x5, 0x0) recvmmsg(r2, &(0x7f0000002280)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff2f}}], 0x300, 0x43, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:29:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000000000000a0002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1315.757873][T19034] BPF: [ 1315.757873][T19034] [ 1315.774238][T19028] BPF:vlen != 0 [ 1315.786180][T19028] BPF: [ 1315.786180][T19028] 20:29:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c9809", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030005"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:29:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) r3 = socket(0x840000000002, 0x0, 0x0) shutdown(r3, 0x1) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1316.009256][T19050] BPF:[2] PTR (anon) [ 1316.043559][T19050] BPF:type_id=1 [ 1316.052539][T19055] BPF:[2] PTR (anon) [ 1316.071243][T19050] BPF: [ 1316.078063][T19056] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1316.082644][T19055] BPF:type_id=1 [ 1316.108865][T19050] BPF:vlen != 0 [ 1316.128929][T19050] BPF: [ 1316.128929][T19050] [ 1316.135273][T19061] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. 20:29:12 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 1316.167692][T19061] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1316.176377][T19055] BPF: [ 1316.196092][T19055] BPF:vlen != 0 20:29:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000200002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1316.221515][T19055] BPF: [ 1316.221515][T19055] 20:29:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c98090000000000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030005"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:29:12 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x70ad}, 0x40800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x424, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xb2d8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r1, 0x0, 0x320f) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00', 0x6) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="28000000a16ddd35b362014a637b98d9628962e434782a39724ecdabc12978f787ef7ae0560f3141e4f711a62bf7f56395447dd68adb43a917561353f424f3caece667aa3b0f901f6a61527cbd1eff199eb1ed8d9cc9cd4f3e5f1981367632fc2e7370d94b58a202c9c7e1444e9e6d1bdab2d153a3b411bacfeeb5d24199b39591f5dc6c645e1d1d12f03b0e43ba2907632aca6f42d4c148089cb57aa96bf7608a6c1102f0424380f2f26bc0bd87e945a0b13bcee87435", @ANYRES16], 0x28}}, 0x4c841) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, 0x0, 0x0) 20:29:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='\v']}) [ 1316.429726][T19074] BPF:[2] PTR (anon) [ 1316.448956][T19074] BPF:type_id=1 [ 1316.461853][T19076] BPF:[2] PTR (anon) [ 1316.471856][T19078] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1316.473868][T19074] BPF: [ 1316.493549][T19076] BPF:type_id=1 [ 1316.506101][T19076] BPF: [ 1316.513621][T19076] BPF:vlen != 0 [ 1316.518991][T19074] BPF:vlen != 0 20:29:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000240002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1316.528863][T19076] BPF: [ 1316.528863][T19076] [ 1316.536645][T19074] BPF: [ 1316.536645][T19074] [ 1316.548527][T19078] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. 20:29:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f00000002c0)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000240)={[{@max_batch_time={'max_batch_time'}}]}) [ 1316.720654][T19086] BPF:[2] PTR (anon) [ 1316.741577][T19086] BPF:type_id=1 [ 1316.754319][T19089] BPF:[2] PTR (anon) [ 1316.761237][T19086] BPF: [ 1316.774379][T19086] BPF:vlen != 0 [ 1316.783855][T19089] BPF:type_id=1 [ 1316.792908][T19086] BPF: [ 1316.792908][T19086] [ 1316.805401][T19089] BPF: [ 1316.816946][T19089] BPF:vlen != 0 [ 1316.831604][T19089] BPF: [ 1316.831604][T19089] 20:29:14 executing program 5: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) 20:29:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c98090000000000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030005"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:29:14 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='\v']}) 20:29:14 executing program 2: r0 = memfd_create(&(0x7f0000000900)='#\'%nodev\x00\x7f\xe5\xd0ql\x86\xcd\xe6\x14\x93\xb0\x7f_,y<', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, 0x0, 0x0) write$sndseq(r2, &(0x7f0000000200)=[{0x76, 0xec, 0x0, 0x3, @time={0x3}, {0xff}, {0xff, 0x3}, @ext={0x96, &(0x7f00000000c0)="bda57baf1c58488bc57208c8ed31115d60b7ffbdc512ff93de927b33a87b60b3ab815d20df167985b36cc607c497a7f7e52ab6d039ded5c1c1ff215fd95fab423e7eb1cdbcac0b6a454fb9aa518ae3f8394049b82944242f0badf42621c8986d60541bdcf466a07c3e6d20337bb2c5d5fa889cf1f7157c5273376c0183109de52461c7db15afbe7f03c0846babea3aaad84c329f2db3"}}, {0xe0, 0xcf, 0x20, 0x18, @tick, {0x0, 0x1}, {0x6, 0x6}, @connect={{0x6, 0xff}, {0x8, 0x7}}}, {0x4, 0x43, 0x81, 0x3, @tick=0x8, {0x4, 0x2}, {0x3, 0x8}, @quote={{0x80, 0xed}, 0x41, &(0x7f0000000000)={0x2, 0x1, 0x6, 0x8, @time={0x6, 0x80000001}, {0x4, 0x2}, {0x9, 0x9}, @time=@time={0xa0, 0x8}}}}, {0x3, 0x1, 0x0, 0x7f, @tick=0x800, {0x7, 0xff}, {}, @time=@time}], 0x70) mount(&(0x7f0000000080), &(0x7f0000000080)='.', 0x0, 0x5010, 0x0) 20:29:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000300002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 20:29:14 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00'}, 0x45c) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0xd) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 1318.750681][T19117] BPF:[2] PTR (anon) 20:29:15 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000100)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0xc) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r3+10000000}, 0x0) [ 1318.778310][T19118] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1318.780757][T19115] input: syz1 as /devices/virtual/input/input5 [ 1318.803003][T19117] BPF:type_id=1 [ 1318.812025][T19127] BPF:[2] PTR (anon) [ 1318.821009][T19117] BPF: [ 1318.831793][T19127] BPF:type_id=1 [ 1318.836694][T19117] BPF:vlen != 0 [ 1318.848902][T19127] BPF: [ 1318.853293][T19117] BPF: [ 1318.853293][T19117] [ 1318.861016][T19118] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1318.872692][T19127] BPF:vlen != 0 20:29:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000370002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1318.882860][T19127] BPF: [ 1318.882860][T19127] [ 1318.890997][T19115] input: failed to attach handler leds to device input5, error: -6 20:29:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c0000002400697c98090000000000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030005"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 1318.982506][T19113] ================================================================== [ 1318.991195][T19113] BUG: KASAN: use-after-free in __mutex_lock+0x1033/0x13c0 [ 1318.998413][T19113] Read of size 8 at addr ffff8880509a9158 by task syz-executor.4/19113 [ 1319.006652][T19113] [ 1319.009000][T19113] CPU: 0 PID: 19113 Comm: syz-executor.4 Not tainted 5.7.0-rc6-next-20200522-syzkaller #0 [ 1319.018896][T19113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1319.028959][T19113] Call Trace: [ 1319.032267][T19113] dump_stack+0x18f/0x20d [ 1319.034895][T19138] BPF:[2] PTR (anon) [ 1319.036699][T19113] ? __mutex_lock+0x1033/0x13c0 [ 1319.036730][T19113] ? __mutex_lock+0x1033/0x13c0 [ 1319.036756][T19113] print_address_description.constprop.0.cold+0xd3/0x413 [ 1319.051973][T19143] BPF:[2] PTR (anon) [ 1319.057456][T19113] ? cdev_device_del+0x69/0x80 [ 1319.057599][T19113] ? evdev_disconnect+0x3d/0xb0 [ 1319.057648][T19113] ? __input_unregister_device+0x1b0/0x430 [ 1319.061929][T19138] BPF:type_id=1 [ 1319.066360][T19113] ? input_unregister_device+0xb4/0xf0 [ 1319.066428][T19113] ? uinput_destroy_device+0x1e2/0x240 [ 1319.066450][T19113] ? vprintk_func+0x97/0x1a6 [ 1319.092862][T19143] BPF:type_id=1 [ 1319.096405][T19113] ? __mutex_lock+0x1033/0x13c0 [ 1319.096424][T19113] kasan_report.cold+0x1f/0x37 [ 1319.096440][T19113] ? __mutex_lock+0x1033/0x13c0 [ 1319.096453][T19113] __mutex_lock+0x1033/0x13c0 [ 1319.096475][T19113] ? evdev_cleanup+0x21/0x190 [ 1319.113942][T19138] BPF: [ 1319.114357][T19113] ? print_usage_bug+0x240/0x240 [ 1319.114379][T19113] ? trace_hardirqs_off+0x50/0x220 [ 1319.131086][T19143] BPF: [ 1319.131592][T19113] ? mutex_trylock+0x2c0/0x2c0 [ 1319.142660][T19138] BPF:vlen != 0 [ 1319.144918][T19113] ? mark_held_locks+0x9f/0xe0 [ 1319.144937][T19113] ? kfree+0x1eb/0x2b0 [ 1319.144960][T19113] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 1319.159904][T19143] BPF:vlen != 0 [ 1319.168385][T19113] ? kfree_const+0x51/0x60 [ 1319.168412][T19113] ? evdev_cleanup+0x21/0x190 20:29:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000700000000000000000000040400000000000000003f0002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1319.168429][T19113] evdev_cleanup+0x21/0x190 [ 1319.176625][T19138] BPF: [ 1319.176625][T19138] [ 1319.181053][T19113] evdev_disconnect+0x45/0xb0 [ 1319.181073][T19113] __input_unregister_device+0x1b0/0x430 [ 1319.181090][T19113] input_unregister_device+0xb4/0xf0 [ 1319.181106][T19113] uinput_destroy_device+0x1e2/0x240 [ 1319.181127][T19113] ? uinput_destroy_device+0x240/0x240 [ 1319.181139][T19113] uinput_release+0x37/0x50 [ 1319.181164][T19113] __fput+0x33e/0x880 [ 1319.199800][T19143] BPF: [ 1319.199800][T19143] [ 1319.200893][T19113] task_work_run+0xf4/0x1b0 [ 1319.200921][T19113] exit_to_usermode_loop+0x2fa/0x360 [ 1319.240954][T19113] do_syscall_64+0x6b1/0x7d0 [ 1319.245572][T19113] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1319.251512][T19113] RIP: 0033:0x416621 [ 1319.255430][T19113] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1319.274992][T19148] BPF:[2] PTR (anon) [ 1319.276371][T19113] RSP: 002b:00007ffdc28c0cf0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1319.276386][T19113] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000416621 [ 1319.276394][T19113] RDX: 0000001b31a20000 RSI: 0000000000000895 RDI: 0000000000000003 [ 1319.276402][T19113] RBP: 0000000000000001 R08: 0000000069d18895 R09: 0000000069d18899 [ 1319.276411][T19113] R10: 00007ffdc28c0de0 R11: 0000000000000293 R12: 000000000078c900 [ 1319.276419][T19113] R13: 000000000078c900 R14: ffffffffffffffff R15: 000000000078bf0c [ 1319.276439][T19113] [ 1319.290572][T19148] BPF:type_id=1 [ 1319.296795][T19113] Allocated by task 19115: [ 1319.296818][T19113] save_stack+0x1b/0x40 [ 1319.296832][T19113] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1319.296844][T19113] kmem_cache_alloc_trace+0x153/0x7d0 [ 1319.296865][T19113] evdev_connect+0x80/0x4d0 [ 1319.296886][T19113] input_attach_handler+0x194/0x200 [ 1319.314620][T19150] BPF:[2] PTR (anon) [ 1319.322364][T19113] input_register_device.cold+0xf5/0x246 [ 1319.322381][T19113] uinput_ioctl_handler.isra.0+0x1210/0x1d80 [ 1319.322459][T19113] ksys_ioctl+0x11a/0x180 [ 1319.322470][T19113] __x64_sys_ioctl+0x6f/0xb0 [ 1319.322485][T19113] do_syscall_64+0xf6/0x7d0 [ 1319.322507][T19113] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1319.350253][T19148] BPF: [ 1319.352636][T19113] [ 1319.352646][T19113] Freed by task 19113: [ 1319.352670][T19113] save_stack+0x1b/0x40 [ 1319.352683][T19113] __kasan_slab_free+0xf7/0x140 [ 1319.352693][T19113] kfree+0x109/0x2b0 [ 1319.352806][T19113] device_release+0x71/0x200 20:29:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000240)=ANY=[], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x300000c, 0x10012, r3, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000400)=ANY=[]) 20:29:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000040)=0x2000001) [ 1319.369913][T19150] BPF:type_id=1 [ 1319.371871][T19113] kobject_put+0x1c8/0x2f0 [ 1319.371889][T19113] cdev_device_del+0x69/0x80 [ 1319.371909][T19113] evdev_disconnect+0x3d/0xb0 [ 1319.371930][T19113] __input_unregister_device+0x1b0/0x430 [ 1319.384974][T19148] BPF:vlen != 0 [ 1319.388731][T19113] input_unregister_device+0xb4/0xf0 [ 1319.388748][T19113] uinput_destroy_device+0x1e2/0x240 [ 1319.388759][T19113] uinput_release+0x37/0x50 [ 1319.388772][T19113] __fput+0x33e/0x880 [ 1319.388784][T19113] task_work_run+0xf4/0x1b0 [ 1319.388798][T19113] exit_to_usermode_loop+0x2fa/0x360 [ 1319.388809][T19113] do_syscall_64+0x6b1/0x7d0 [ 1319.388824][T19113] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1319.388838][T19113] [ 1319.405049][T19148] BPF: [ 1319.405049][T19148] [ 1319.407518][T19113] The buggy address belongs to the object at ffff8880509a9000 [ 1319.407518][T19113] which belongs to the cache kmalloc-2k of size 2048 [ 1319.407531][T19113] The buggy address is located 344 bytes inside of [ 1319.407531][T19113] 2048-byte region [ffff8880509a9000, ffff8880509a9800) [ 1319.407536][T19113] The buggy address belongs to the page: [ 1319.407552][T19113] page:ffffea0001426a40 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 [ 1319.407562][T19113] flags: 0xfffe0000000200(slab) [ 1319.407579][T19113] raw: 00fffe0000000200 ffffea000159bcc8 ffffea00022485c8 ffff8880aa000e00 [ 1319.407592][T19113] raw: 0000000000000000 ffff8880509a9000 0000000100000001 0000000000000000 [ 1319.407598][T19113] page dumped because: kasan: bad access detected [ 1319.407602][T19113] [ 1319.407606][T19113] Memory state around the buggy address: [ 1319.407616][T19113] ffff8880509a9000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1319.407626][T19113] ffff8880509a9080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1319.407640][T19113] >ffff8880509a9100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1319.416373][T19150] BPF: [ 1319.418238][T19113] ^ [ 1319.418252][T19113] ffff8880509a9180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 20:29:15 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r0, &(0x7f0000000740)=[{0x0}, {&(0x7f0000000380)=""/202, 0xca}, {&(0x7f0000000480)=""/63, 0x3f}, {0x0}, {&(0x7f0000000680)=""/106, 0x6a}], 0x5, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_mtu(r1, 0x0, 0x4, 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r1, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x24000000}, 0x8810) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@empty, @ipv4={[0x0, 0x0, 0x8], [], @multicast2}, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x2], 0x0, 0x0}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev={0xfe, 0x80, [], 0xe}, @in=@loopback, 0x0, 0x4800, 0x0, 0x7, 0xa, 0x0, 0x20, 0x3b}, {0x0, 0x0, 0x20, 0x9ee, 0x7, 0x7fffffff, 0xffffffffffffff6f, 0x7fffffff}, {0x8b, 0xffffffffffff0001}, 0xffffffff, 0x6e6bbd, 0x2}, {{@in6=@remote, 0x4d5, 0xff}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3502, 0x1, 0x1, 0x0, 0x3, 0x1}}, 0xe8) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8004) 20:29:15 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) recvmmsg(r0, &(0x7f0000000440), 0x6f5, 0x2000000022, &(0x7f0000000480)={0x77359400}) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="0205000002"], 0x10}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001900)=[{0x0}, {&(0x7f00000014c0)=""/8, 0x8}], 0x2}, 0x0) [ 1319.418260][T19113] ffff8880509a9200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1319.418265][T19113] ================================================================== [ 1319.418270][T19113] Disabling lock debugging due to kernel taint [ 1319.479988][T19152] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. 20:29:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000240)=ANY=[], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x300000c, 0x10012, r3, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000400)=ANY=[]) 20:29:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000240)=ANY=[], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x300000c, 0x10012, r3, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000400)=ANY=[]) 20:29:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000070000000000000000000004040000000000000000480002010000000000000001000004"], &(0x7f0000004600)=""/210, 0x4f, 0xd2, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1319.721408][T19152] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1319.744391][T19150] BPF:vlen != 0 [ 1319.763412][T19150] BPF: [ 1319.763412][T19150] [ 1319.839966][T19113] Kernel panic - not syncing: panic_on_warn set ... [ 1319.846686][T19113] CPU: 0 PID: 19113 Comm: syz-executor.4 Tainted: G B 5.7.0-rc6-next-20200522-syzkaller #0 [ 1319.858318][T19113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1319.868497][T19113] Call Trace: [ 1319.872174][T19113] dump_stack+0x18f/0x20d [ 1319.877479][T19113] ? __mutex_lock+0xf50/0x13c0 [ 1319.884029][T19113] panic+0x2e3/0x75c [ 1319.887936][T19113] ? __warn_printk+0xf3/0xf3 [ 1319.892672][T19113] ? preempt_schedule_common+0x5e/0xc0 [ 1319.898145][T19113] ? __mutex_lock+0x1033/0x13c0 [ 1319.903354][T19113] ? __mutex_lock+0x1033/0x13c0 [ 1319.908520][T19113] ? preempt_schedule_thunk+0x16/0x18 [ 1319.914074][T19113] ? trace_hardirqs_on+0x55/0x230 [ 1319.919115][T19113] ? __mutex_lock+0x1033/0x13c0 [ 1319.920338][T19177] BPF:[2] PTR (anon) [ 1319.923975][T19113] ? __mutex_lock+0x1033/0x13c0 [ 1319.923993][T19113] end_report+0x4d/0x53 [ 1319.924006][T19113] kasan_report.cold+0xd/0x37 [ 1319.924026][T19113] ? __mutex_lock+0x1033/0x13c0 [ 1319.946470][T19113] __mutex_lock+0x1033/0x13c0 [ 1319.951162][T19113] ? evdev_cleanup+0x21/0x190 [ 1319.955878][T19113] ? print_usage_bug+0x240/0x240 [ 1319.959151][T19177] BPF:type_id=1 [ 1319.960953][T19113] ? trace_hardirqs_off+0x50/0x220 [ 1319.960967][T19113] ? mutex_trylock+0x2c0/0x2c0 [ 1319.960989][T19113] ? mark_held_locks+0x9f/0xe0 [ 1319.979683][T19113] ? kfree+0x1eb/0x2b0 [ 1319.981457][T19177] BPF: [ 1319.983777][T19113] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 1319.983795][T19113] ? kfree_const+0x51/0x60 [ 1319.983811][T19113] ? evdev_cleanup+0x21/0x190 [ 1319.983829][T19113] evdev_cleanup+0x21/0x190 [ 1320.007256][T19113] evdev_disconnect+0x45/0xb0 [ 1320.011948][T19113] __input_unregister_device+0x1b0/0x430 [ 1320.017590][T19113] input_unregister_device+0xb4/0xf0 [ 1320.021306][T19177] BPF:vlen != 0 [ 1320.023598][T19113] uinput_destroy_device+0x1e2/0x240 [ 1320.023614][T19113] ? uinput_destroy_device+0x240/0x240 [ 1320.023623][T19113] uinput_release+0x37/0x50 [ 1320.023652][T19113] __fput+0x33e/0x880 [ 1320.046314][T19113] task_work_run+0xf4/0x1b0 [ 1320.050921][T19113] exit_to_usermode_loop+0x2fa/0x360 [ 1320.053618][T19177] BPF: [ 1320.053618][T19177] [ 1320.056555][T19113] do_syscall_64+0x6b1/0x7d0 [ 1320.056574][T19113] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1320.056588][T19113] RIP: 0033:0x416621 [ 1320.076678][T19113] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1320.096641][T19113] RSP: 002b:00007ffdc28c0cf0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1320.098773][T19179] BPF:[2] PTR (anon) [ 1320.105229][T19113] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000416621 [ 1320.105235][T19113] RDX: 0000001b31a20000 RSI: 0000000000000895 RDI: 0000000000000003 [ 1320.105242][T19113] RBP: 0000000000000001 R08: 0000000069d18895 R09: 0000000069d18899 [ 1320.105249][T19113] R10: 00007ffdc28c0de0 R11: 0000000000000293 R12: 000000000078c900 [ 1320.105256][T19113] R13: 000000000078c900 R14: ffffffffffffffff R15: 000000000078bf0c [ 1320.110718][T19113] Kernel Offset: disabled [ 1320.154968][T19113] Rebooting in 86400 seconds..