0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1012.390701][ T476] BPF:[1] FUNC_PROTO (anon) [ 1012.396360][ T476] BPF:return=1280 args=( [ 1012.400645][ T476] BPF:0 (anon) [ 1012.403295][ T478] BPF:[1] FUNC_PROTO (anon) [ 1012.405387][ T476] BPF:, 0 [ 1012.408843][ T478] BPF:return=0 args=( [ 1012.411911][ T476] BPF:, vararg [ 1012.411924][ T476] BPF:) [ 1012.411934][ T476] BPF: [ 1012.411944][ T476] BPF:Invalid return type [ 1012.411954][ T476] BPF: [ 1012.411954][ T476] [ 1012.437463][ T478] BPF:16777215 (anon) [ 1012.442820][ T478] BPF:, 2 [ 1012.446157][ T478] BPF:) [ 1012.448921][ T478] BPF: [ 1012.453030][ T478] BPF:Invalid arg#1 [ 1012.456880][ T478] BPF: [ 1012.456880][ T478] [ 1012.467382][ T477] BPF:[1] FUNC_PROTO (anon) [ 1012.473273][ T477] BPF:return=1280 args=( [ 1012.477530][ T477] BPF:0 (anon) [ 1012.480937][ T477] BPF:, 0 [ 1012.484951][ T477] BPF:, vararg [ 1012.488333][ T477] BPF:) [ 1012.491110][ T477] BPF: [ 1012.495144][ T477] BPF:Invalid return type [ 1012.499485][ T477] BPF: [ 1012.499485][ T477] [ 1012.527391][ T483] BPF:[1] FUNC_PROTO (anon) [ 1012.533159][ T483] BPF:return=0 args=( [ 1012.537243][ T483] BPF:16777215 (anon) [ 1012.541230][ T483] BPF:, 2 [ 1012.545281][ T483] BPF:) [ 1012.548410][ T483] BPF: [ 1012.551179][ T483] BPF:Invalid arg#1 [ 1012.556226][ T483] BPF: [ 1012.556226][ T483] 01:11:30 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x600, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1012.644365][ T497] BPF:[1] FUNC_PROTO (anon) [ 1012.649034][ T497] BPF:return=0 args=( [ 1012.655727][ T497] BPF:0 (invalid-name-offset) [ 1012.660432][ T497] BPF:, vararg [ 1012.665421][ T497] BPF:) [ 1012.668203][ T497] BPF: [ 1012.670972][ T497] BPF:Invalid arg#1 [ 1012.674371][ T501] device vlan1215 entered promiscuous mode [ 1012.674825][ T497] BPF: [ 1012.674825][ T497] 01:11:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xfffffdfc, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1012.698109][ T499] BPF:[1] FUNC_PROTO (anon) [ 1012.704073][ T499] BPF:return=0 args=( [ 1012.708066][ T499] BPF:0 (invalid-name-offset) [ 1012.713788][ T499] BPF:, vararg [ 1012.717169][ T499] BPF:) [ 1012.719927][ T499] BPF: [ 1012.723876][ T499] BPF:Invalid arg#1 [ 1012.727687][ T499] BPF: [ 1012.727687][ T499] 01:11:30 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x1000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:30 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7ffffff2}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1012.897586][ T507] BPF:[1] FUNC_PROTO (anon) [ 1012.903241][ T507] BPF:return=1536 args=( [ 1012.907503][ T507] BPF:0 (anon) [ 1012.910889][ T507] BPF:, 0 [ 1012.915107][ T507] BPF:, vararg [ 1012.918487][ T507] BPF:) [ 1012.921254][ T507] BPF: [ 1012.924078][ T507] BPF:Invalid return type [ 1012.928409][ T507] BPF: [ 1012.928409][ T507] [ 1012.970507][ T509] BPF:[1] FUNC_PROTO (anon) [ 1012.976084][ T509] BPF:return=1536 args=( [ 1012.980346][ T509] BPF:0 (anon) [ 1012.984978][ T509] BPF:, 0 [ 1012.988015][ T509] BPF:, vararg [ 1012.992654][ T509] BPF:) [ 1012.995426][ T509] BPF: [ 1012.998192][ T509] BPF:Invalid return type [ 1013.003600][ T509] BPF: [ 1013.003600][ T509] [ 1013.144565][ T529] BPF:[1] FUNC_PROTO (anon) [ 1013.149245][ T529] BPF:return=0 args=( [ 1013.154273][ T529] BPF:16777216 (anon) [ 1013.158272][ T529] BPF:, 2 [ 1013.163012][ T529] BPF:) [ 1013.165793][ T529] BPF: [ 1013.168698][ T529] BPF:Invalid arg#1 [ 1013.172554][ T529] BPF: [ 1013.172554][ T529] [ 1013.180933][ T530] BPF:[1] FUNC_PROTO (anon) [ 1013.188043][ T530] BPF:return=0 args=( [ 1013.193121][ T530] BPF:0 (invalid-name-offset) [ 1013.197843][ T530] BPF:, vararg [ 1013.197860][ T531] BPF:[1] FUNC_PROTO (anon) [ 1013.201209][ T530] BPF:) [ 1013.201220][ T530] BPF: [ 1013.206740][ T531] BPF:return=0 args=( [ 1013.208622][ T530] BPF:Invalid arg#1 [ 1013.212512][ T531] BPF:16777216 (anon) [ 1013.212526][ T531] BPF:, 2 [ 1013.212535][ T531] BPF:) [ 1013.212544][ T531] BPF: [ 1013.212554][ T531] BPF:Invalid arg#1 [ 1013.212563][ T531] BPF: [ 1013.212563][ T531] 01:11:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xfffffdfd, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1013.245770][ T530] BPF: [ 1013.245770][ T530] [ 1013.265565][ T534] BPF:[1] FUNC_PROTO (anon) [ 1013.270251][ T534] BPF:return=0 args=( [ 1013.275269][ T534] BPF:0 (invalid-name-offset) [ 1013.279953][ T534] BPF:, vararg [ 1013.284564][ T534] BPF:) [ 1013.287337][ T534] BPF: [ 1013.290096][ T534] BPF:Invalid arg#1 [ 1013.294832][ T534] BPF: [ 1013.294832][ T534] [ 1013.314992][ T536] device vlan1216 entered promiscuous mode 01:11:30 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x700, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:30 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1013.633551][ T559] BPF:[1] FUNC_PROTO (anon) [ 1013.638212][ T559] BPF:return=1792 args=( [ 1013.643855][ T559] BPF:0 (anon) [ 1013.647246][ T559] BPF:, 0 [ 1013.650273][ T559] BPF:, vararg [ 1013.653730][ T559] BPF:) [ 1013.656493][ T559] BPF: [ 1013.659259][ T559] BPF:Invalid return type [ 1013.663670][ T559] BPF: [ 1013.663670][ T559] 01:11:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xffffff7f, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:11:31 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7ffffff8}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1013.688160][ T560] BPF:[1] FUNC_PROTO (anon) [ 1013.693898][ T560] BPF:return=0 args=( [ 1013.698127][ T560] BPF:33554432 (anon) [ 1013.703242][ T560] BPF:, 2 [ 1013.706279][ T560] BPF:) [ 1013.709041][ T560] BPF: [ 1013.712769][ T560] BPF:Invalid arg#1 [ 1013.716583][ T560] BPF: [ 1013.716583][ T560] [ 1013.735794][ T562] BPF:[1] FUNC_PROTO (anon) [ 1013.740414][ T562] BPF:return=1792 args=( [ 1013.745923][ T562] BPF:0 (anon) [ 1013.749308][ T562] BPF:, 0 [ 1013.753455][ T562] BPF:, vararg [ 1013.756835][ T562] BPF:) [ 1013.759604][ T562] BPF: [ 1013.763338][ T562] BPF:Invalid return type [ 1013.767673][ T562] BPF: [ 1013.767673][ T562] [ 1013.797571][ T566] device vlan1217 entered promiscuous mode 01:11:31 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xa00, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:31 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000000), 0x4, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000140)={r2}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r3, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_SG_ALLOC(r3, 0xc0106438, &(0x7f00000001c0)={0x8}) r4 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x404400) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r5}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x4, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) dup(0xffffffffffffffff) [ 1013.944585][ T579] BPF:[1] FUNC_PROTO (anon) [ 1013.949282][ T579] BPF:return=0 args=( [ 1013.954441][ T579] BPF:0 (invalid-name-offset) [ 1013.959135][ T579] BPF:, vararg [ 1013.963526][ T579] BPF:) [ 1013.966300][ T579] BPF: [ 1013.969070][ T579] BPF:Invalid arg#1 [ 1013.973999][ T579] BPF: [ 1013.973999][ T579] [ 1013.986094][ T560] BPF:[1] FUNC_PROTO (anon) [ 1013.990734][ T560] BPF:return=0 args=( [ 1013.995968][ T560] BPF:33554432 (anon) [ 1013.999998][ T560] BPF:, 2 [ 1014.004265][ T560] BPF:) [ 1014.007044][ T560] BPF: [ 1014.009809][ T560] BPF:Invalid arg#1 [ 1014.014821][ T560] BPF: [ 1014.014821][ T560] [ 1014.020634][ T583] BPF:[1] FUNC_PROTO (anon) [ 1014.026182][ T583] BPF:return=0 args=( [ 1014.030174][ T583] BPF:0 (invalid-name-offset) [ 1014.036144][ T583] BPF:, vararg [ 1014.039524][ T583] BPF:) [ 1014.042358][ T583] BPF: 01:11:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x4, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1014.045120][ T583] BPF:Invalid arg#1 [ 1014.048917][ T583] BPF: [ 1014.048917][ T583] 01:11:31 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x81000, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000000)={0x7ffe, 0x1f, 0x5fa}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:11:31 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x3000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xffffff8c, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:11:31 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7ffffff9}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1014.302802][ T615] BPF:[1] FUNC_PROTO (anon) [ 1014.307429][ T615] BPF:return=2560 args=( [ 1014.312802][ T615] BPF:0 (anon) [ 1014.316192][ T615] BPF:, 0 [ 1014.319220][ T615] BPF:, vararg [ 1014.323667][ T615] BPF:) [ 1014.326445][ T615] BPF: [ 1014.329314][ T615] BPF:Invalid return type [ 1014.334685][ T615] BPF: [ 1014.334685][ T615] [ 1014.351691][ T616] BPF:[1] FUNC_PROTO (anon) [ 1014.356373][ T616] BPF:return=2560 args=( [ 1014.360624][ T616] BPF:0 (anon) [ 1014.366552][ T616] BPF:, 0 [ 1014.369580][ T616] BPF:, vararg [ 1014.372987][ T616] BPF:) [ 1014.375752][ T616] BPF: [ 1014.378517][ T616] BPF:Invalid return type [ 1014.382900][ T616] BPF: [ 1014.382900][ T616] [ 1014.405849][ T614] device vlan1218 entered promiscuous mode [ 1014.466696][ T632] BPF:[1] FUNC_PROTO (anon) [ 1014.473308][ T632] BPF:return=0 args=( [ 1014.477309][ T632] BPF:50331648 (anon) [ 1014.482562][ T632] BPF:, 2 [ 1014.485592][ T632] BPF:) [ 1014.488355][ T632] BPF: [ 1014.491125][ T632] BPF:Invalid arg#1 [ 1014.496296][ T632] BPF: [ 1014.496296][ T632] [ 1014.517139][ T634] BPF:[1] FUNC_PROTO (anon) [ 1014.523451][ T634] BPF:return=0 args=( [ 1014.527452][ T634] BPF:50331648 (anon) [ 1014.532612][ T634] BPF:, 2 [ 1014.535650][ T634] BPF:) [ 1014.538411][ T634] BPF: [ 1014.542297][ T634] BPF:Invalid arg#1 [ 1014.546108][ T634] BPF: [ 1014.546108][ T634] 01:11:32 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x1100, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1014.577438][ T648] BPF:[1] FUNC_PROTO (anon) [ 1014.583187][ T648] BPF:return=0 args=( [ 1014.587188][ T648] BPF:0 (invalid-name-offset) [ 1014.591961][ T648] BPF:, vararg [ 1014.595348][ T648] BPF:) [ 1014.598109][ T648] BPF: [ 1014.600877][ T648] BPF:Invalid arg#1 [ 1014.604757][ T648] BPF: [ 1014.604757][ T648] 01:11:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x5, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:32 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x4000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:32 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) gettid() r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1014.666515][ T649] BPF:[1] FUNC_PROTO (anon) [ 1014.671217][ T649] BPF:return=0 args=( [ 1014.675207][ T649] BPF:0 (invalid-name-offset) [ 1014.679881][ T649] BPF:, vararg [ 1014.683325][ T649] BPF:) [ 1014.686087][ T649] BPF: [ 1014.688847][ T649] BPF:Invalid arg#1 [ 1014.692713][ T649] BPF: [ 1014.692713][ T649] 01:11:32 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xffffff1f}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xffffff97, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1014.876603][ T658] BPF:[1] FUNC_PROTO (anon) [ 1014.882549][ T658] BPF:return=4352 args=( [ 1014.886815][ T658] BPF:0 (anon) [ 1014.890195][ T658] BPF:, 0 [ 1014.894843][ T658] BPF:, vararg [ 1014.898229][ T658] BPF:) [ 1014.900999][ T658] BPF: [ 1014.905399][ T658] BPF:Invalid return type [ 1014.909736][ T658] BPF: [ 1014.909736][ T658] [ 1014.938339][ T664] BPF:[1] FUNC_PROTO (anon) [ 1014.944058][ T664] BPF:return=4352 args=( [ 1014.948310][ T664] BPF:0 (anon) [ 1014.952780][ T664] BPF:, 0 [ 1014.955810][ T664] BPF:, vararg [ 1014.959183][ T664] BPF:) [ 1014.962920][ T664] BPF: [ 1014.965697][ T664] BPF:Invalid return type [ 1014.970021][ T664] BPF: [ 1014.970021][ T664] [ 1014.977251][ T675] BPF:[1] FUNC_PROTO (anon) [ 1014.984154][ T675] BPF:return=0 args=( [ 1014.988157][ T675] BPF:67108864 (anon) [ 1014.992213][ T675] BPF:, 2 [ 1014.995240][ T675] BPF:) [ 1014.998006][ T675] BPF: [ 1015.000806][ T675] BPF:Invalid arg#1 [ 1015.004665][ T675] BPF: [ 1015.004665][ T675] [ 1015.031053][ T678] device vlan1219 entered promiscuous mode [ 1015.045002][ T676] BPF:[1] FUNC_PROTO (anon) [ 1015.049684][ T676] BPF:return=0 args=( [ 1015.055970][ T676] BPF:67108864 (anon) [ 1015.059966][ T676] BPF:, 2 [ 1015.064228][ T676] BPF:) [ 1015.067037][ T676] BPF: [ 1015.069801][ T676] BPF:Invalid arg#1 [ 1015.074809][ T676] BPF: [ 1015.074809][ T676] 01:11:32 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x5000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1015.152493][ T688] BPF:[1] FUNC_PROTO (anon) [ 1015.157121][ T688] BPF:return=0 args=( [ 1015.162330][ T688] BPF:0 (invalid-name-offset) [ 1015.167022][ T688] BPF:, vararg [ 1015.168076][ T693] BPF:[1] FUNC_PROTO (anon) [ 1015.170391][ T688] BPF:) [ 1015.170402][ T688] BPF: [ 1015.170411][ T688] BPF:Invalid arg#1 [ 1015.170422][ T688] BPF: [ 1015.170422][ T688] [ 1015.192878][ T693] BPF:return=0 args=( [ 1015.196857][ T693] BPF:0 (invalid-name-offset) 01:11:32 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x0, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) clone(0x0, &(0x7f00000001c0)="d9060ed92ec804315dd712ed62637119b0d52095962fd721e51f804ea2392dfab596750a92ba2d1246d8ac3c13564e9e3c39e1d6cf057a85dc933ff45024e6b83f030f44c308c653d934819a5f8d2c58a31e8d7a16034a78e1fd57f36a78289a15a5b9d72b22c1a18a4e249a5700b2f08b13c9f34e5580c3b67bc5b1606c2ee9fb9989d67427c54607c93affe55be7af8364eafe233c2869e5a3881829bbfe5e2f82aa991877f8acd1cdd7ed4382095ba42f", &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000480)="84a3826462986f415a553b15330ac8fde769e4455dba8450ff1eba936250e7c31969d888c978873880558e28c5a9cc7aaa651b7652d0713ce31a729ac1d4a1c93985a5dfdd5f2d501e8856e83c04020d882d000000000b65757cb6d27373e16984f735733a3a284790de3e3cc328702278d86d519d4d3449c08c57c0a7225614db268ff8ac06df") ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000040)={0x400, 0x3, 0x7}) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$setregs(0xf, r2, 0x2, &(0x7f0000000540)="3994c4df2ff35a3ca31bf7274fc04f9808d2160a97f8dca2896feac421f228282cb98c1b921aa14ba8416675408500c5aa88a5d14f2577a4966fd2e38b8c3f68c9b0da72649a55eb4d703b2ab4205937e8501dd7be7ea31cb1d8684de05a49a072c78db76c68b066102160d5accc964be18d389572b87b3cd574f3c657adebfa3d0f4c6918e7ec9c6b914f88369326dd8ee814d0ecb5d7687bd6b00d9b9c668127d6e8ad8efd3d5757f172c2") ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) clone(0x81001000, &(0x7f0000000640)="0e58595910d7fe95a827c6fd1a58bfa5400e5b0962724cc1b4589c93c54f072fc7a5442c7d705606c7895cffbf30bfa5189390ab079f5a1df2b90c6eef1d3b986b1472a70bc5b57506755aca0b6ab60452ff57fb92d06f", &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000600)="5ada971b888169f2754715fb733ea374a69df97c01d2ab20af37ae1e238e20e0b917379a17a1c848ae552026bd4f61e0a6a4fb97d69b") r3 = syz_open_dev$dri(&(0x7f0000000340), 0x4, 0x11d140) r4 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000280)={0xfffffffb, 0x100, 0x9}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000580)={0x800, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, &(0x7f00000002c0)={0x40000000, 0x20, 0x17}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x6, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r5}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000080)={0x9, 0x1004, 0x8}) [ 1015.201589][ T693] BPF:, vararg [ 1015.204966][ T693] BPF:) [ 1015.207731][ T693] BPF: [ 1015.210509][ T693] BPF:Invalid arg#1 [ 1015.214465][ T693] BPF: [ 1015.214465][ T693] 01:11:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:32 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:32 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x1f00, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xfffffff6, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1015.393532][ T713] BPF:[1] FUNC_PROTO (anon) [ 1015.398186][ T713] BPF:return=0 args=( [ 1015.404400][ T713] BPF:83886080 (anon) [ 1015.408398][ T713] BPF:, 2 [ 1015.412594][ T713] BPF:) [ 1015.415562][ T713] BPF: [ 1015.418338][ T713] BPF:Invalid arg#1 [ 1015.423841][ T713] BPF: [ 1015.423841][ T713] [ 1015.448066][ T714] BPF:[1] FUNC_PROTO (anon) [ 1015.454050][ T714] BPF:return=0 args=( [ 1015.458133][ T714] BPF:83886080 (anon) [ 1015.463286][ T714] BPF:, 2 [ 1015.466324][ T714] BPF:) [ 1015.469088][ T714] BPF: [ 1015.473138][ T714] BPF:Invalid arg#1 [ 1015.477036][ T714] BPF: [ 1015.477036][ T714] [ 1015.495923][ T718] BPF:[1] FUNC_PROTO (anon) [ 1015.500578][ T718] BPF:return=0 args=( [ 1015.505754][ T718] BPF:0 [ 1015.509059][ T718] BPF:, vararg [ 1015.513588][ T718] BPF:) [ 1015.516529][ T718] BPF: [ 1015.519296][ T718] BPF:Invalid arg#1 [ 1015.524520][ T718] BPF: [ 1015.524520][ T718] [ 1015.554275][ T720] BPF:[1] FUNC_PROTO (anon) [ 1015.558978][ T720] BPF:return=0 args=( [ 1015.564580][ T720] BPF:0 [ 1015.567445][ T720] BPF:, vararg [ 1015.570819][ T720] BPF:) [ 1015.573627][ T720] BPF: [ 1015.573692][ T730] device vlan1220 entered promiscuous mode [ 1015.576385][ T720] BPF:Invalid arg#1 [ 1015.586010][ T720] BPF: [ 1015.586010][ T720] [ 1015.607032][ T733] BPF:[1] FUNC_PROTO (anon) [ 1015.614086][ T733] BPF:return=7936 args=( [ 1015.618357][ T733] BPF:0 (anon) [ 1015.623382][ T733] BPF:, 0 [ 1015.626431][ T733] BPF:, vararg [ 1015.629811][ T733] BPF:) [ 1015.633815][ T733] BPF: [ 1015.636584][ T733] BPF:Invalid return type [ 1015.640912][ T733] BPF: [ 1015.640912][ T733] 01:11:33 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x6000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1015.661669][ T736] BPF:[1] FUNC_PROTO (anon) [ 1015.666363][ T736] BPF:return=7936 args=( [ 1015.670607][ T736] BPF:0 (anon) [ 1015.676208][ T736] BPF:, 0 [ 1015.679244][ T736] BPF:, vararg [ 1015.683938][ T736] BPF:) [ 1015.686712][ T736] BPF: [ 1015.689475][ T736] BPF:Invalid return type [ 1015.693861][ T736] BPF: [ 1015.693861][ T736] 01:11:33 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x2}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:33 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x2000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xfffffffd, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1015.930399][ T764] BPF:[1] FUNC_PROTO (anon) [ 1015.936232][ T764] BPF:return=0 args=( [ 1015.940227][ T764] BPF:100663296 (anon) [ 1015.945369][ T764] BPF:, 2 [ 1015.948416][ T764] BPF:) [ 1015.952410][ T764] BPF: [ 1015.955193][ T764] BPF:Invalid arg#1 [ 1015.958997][ T764] BPF: [ 1015.958997][ T764] [ 1016.053226][ T768] BPF:[1] FUNC_PROTO (anon) [ 1016.057910][ T768] BPF:return=0 args=( [ 1016.063008][ T768] BPF:2 [ 1016.065870][ T768] BPF:, vararg [ 1016.069245][ T768] BPF:) [ 1016.073168][ T768] BPF: [ 1016.075943][ T768] BPF:Invalid arg#1 [ 1016.079749][ T768] BPF: [ 1016.079749][ T768] [ 1016.103325][ T769] BPF:[1] FUNC_PROTO (anon) [ 1016.108014][ T769] BPF:return=0 args=( [ 1016.113293][ T769] BPF:2 [ 1016.116153][ T769] BPF:, vararg [ 1016.119525][ T769] BPF:) [ 1016.123697][ T769] BPF: [ 1016.126479][ T769] BPF:Invalid arg#1 [ 1016.130278][ T769] BPF: [ 1016.130278][ T769] [ 1016.214348][ T786] BPF:[1] FUNC_PROTO (anon) [ 1016.219053][ T786] BPF:return=8192 args=( [ 1016.224207][ T786] BPF:0 (anon) [ 1016.224430][ T785] device vlan1221 entered promiscuous mode [ 1016.227587][ T786] BPF:, 0 [ 1016.237846][ T786] BPF:, vararg [ 1016.242538][ T786] BPF:) [ 1016.245308][ T786] BPF: [ 1016.248070][ T786] BPF:Invalid return type [ 1016.252450][ T786] BPF: [ 1016.252450][ T786] 01:11:33 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x18, 0x1, 0x70bd2c, 0x25dfdbfe, {0xc}}, 0x14}, 0x1, 0x0, 0x0, 0x10090}, 0x4000) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000240)) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1016.295338][ T757] BPF:[1] FUNC_PROTO (anon) [ 1016.300001][ T757] BPF:return=0 args=( [ 1016.305465][ T757] BPF:100663296 (anon) [ 1016.309554][ T757] BPF:, 2 [ 1016.313718][ T757] BPF:) [ 1016.316496][ T757] BPF: [ 1016.319266][ T757] BPF:Invalid arg#1 [ 1016.323888][ T757] BPF: [ 1016.323888][ T757] 01:11:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x8, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:33 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x3}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:33 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x7000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:33 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x2400, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xfffffffe, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1016.616539][ T815] BPF:[1] FUNC_PROTO (anon) [ 1016.622362][ T815] BPF:return=0 args=( [ 1016.626361][ T815] BPF:3 [ 1016.630085][ T815] BPF:, vararg [ 1016.634462][ T815] BPF:) [ 1016.637235][ T815] BPF: [ 1016.640003][ T815] BPF:Invalid arg#1 [ 1016.645289][ T815] BPF: [ 1016.645289][ T815] [ 1016.678335][ T825] BPF:[1] FUNC_PROTO (anon) [ 1016.684256][ T825] BPF:return=0 args=( [ 1016.688252][ T825] BPF:117440512 (anon) [ 1016.692381][ T825] BPF:, 2 [ 1016.695408][ T825] BPF:) [ 1016.698167][ T825] BPF: [ 1016.700926][ T825] BPF:Invalid arg#1 [ 1016.704801][ T825] BPF: [ 1016.704801][ T825] [ 1016.712950][ T826] BPF:[1] FUNC_PROTO (anon) [ 1016.717556][ T826] BPF:return=0 args=( [ 1016.722834][ T826] BPF:3 [ 1016.725695][ T826] BPF:, vararg [ 1016.729106][ T826] BPF:) [ 1016.731937][ T826] BPF: [ 1016.734702][ T826] BPF:Invalid arg#1 [ 1016.738498][ T826] BPF: [ 1016.738498][ T826] [ 1016.749778][ T827] BPF:[1] FUNC_PROTO (anon) [ 1016.755648][ T827] BPF:return=0 args=( [ 1016.759650][ T827] BPF:117440512 (anon) [ 1016.764943][ T827] BPF:, 2 [ 1016.768057][ T827] BPF:) [ 1016.770815][ T827] BPF: [ 1016.775052][ T827] BPF:Invalid arg#1 [ 1016.778859][ T827] BPF: [ 1016.778859][ T827] 01:11:34 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/ldiscs\x00', 0x0, 0x0) close_range(r1, r4, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000000)={0xc3, 0xfffffffa, 0x2}) 01:11:34 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x8000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1016.813767][ T833] BPF:[1] FUNC_PROTO (anon) [ 1016.818484][ T833] BPF:return=9216 args=( [ 1016.823995][ T833] BPF:0 (anon) [ 1016.827406][ T833] BPF:, 0 [ 1016.830424][ T833] BPF:, vararg [ 1016.834860][ T833] BPF:) [ 1016.837637][ T833] BPF: [ 1016.840400][ T833] BPF:Invalid return type [ 1016.845955][ T833] BPF: [ 1016.845955][ T833] 01:11:34 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x4}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1016.922466][ T834] BPF:[1] FUNC_PROTO (anon) [ 1016.927089][ T834] BPF:return=9216 args=( [ 1016.932508][ T834] BPF:0 (anon) [ 1016.935908][ T834] BPF:, 0 [ 1016.938933][ T834] BPF:, vararg [ 1016.943492][ T834] BPF:) [ 1016.946271][ T834] BPF: [ 1016.949039][ T834] BPF:Invalid return type [ 1016.954606][ T834] BPF: [ 1016.954606][ T834] [ 1017.073183][ T855] BPF:[1] FUNC_PROTO (anon) [ 1017.077895][ T855] BPF:return=0 args=( [ 1017.083373][ T855] BPF:134217728 (anon) [ 1017.087457][ T855] BPF:, 2 [ 1017.090532][ T855] BPF:) [ 1017.094641][ T855] BPF: [ 1017.097414][ T855] BPF:Invalid arg#1 [ 1017.102418][ T855] BPF: [ 1017.102418][ T855] 01:11:34 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x2600, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xedc000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1017.132636][ T856] BPF:[1] FUNC_PROTO (anon) [ 1017.137283][ T856] BPF:return=0 args=( [ 1017.142549][ T856] BPF:134217728 (anon) [ 1017.146630][ T856] BPF:, 2 [ 1017.149652][ T856] BPF:) [ 1017.153517][ T856] BPF: [ 1017.156482][ T856] BPF:Invalid arg#1 [ 1017.160290][ T856] BPF: [ 1017.160290][ T856] 01:11:34 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0xa000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1017.234292][ T862] BPF:[1] FUNC_PROTO (anon) [ 1017.238918][ T862] BPF:return=0 args=( [ 1017.244437][ T862] BPF:4 [ 1017.247299][ T862] BPF:, vararg [ 1017.250671][ T862] BPF:) [ 1017.253588][ T862] BPF: [ 1017.256357][ T862] BPF:Invalid arg#1 [ 1017.261368][ T862] BPF: [ 1017.261368][ T862] [ 1017.275783][ T874] BPF:[1] FUNC_PROTO (anon) [ 1017.280463][ T874] BPF:return=0 args=( [ 1017.285611][ T874] BPF:4 [ 1017.288464][ T874] BPF:, vararg [ 1017.293054][ T874] BPF:) [ 1017.295821][ T874] BPF: [ 1017.298580][ T874] BPF:Invalid arg#1 [ 1017.303719][ T874] BPF: [ 1017.303719][ T874] 01:11:34 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f00000001c0)={0x8, 0x4, 0x401, 0x222b, 0x3, [0x4, 0x5, 0x1, 0x7e91], [0x9, 0x1ff, 0x1], [0x42, 0x6, 0x6, 0xf74], [0xc21, 0x7, 0x7, 0xffffffffffffff20]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1017.332655][ T883] device vlan1222 entered promiscuous mode [ 1017.397016][ T889] BPF:[1] FUNC_PROTO (anon) [ 1017.402851][ T889] BPF:return=9728 args=( [ 1017.407284][ T889] BPF:0 (anon) [ 1017.410760][ T889] BPF:, 0 [ 1017.415403][ T889] BPF:, vararg [ 1017.418793][ T889] BPF:) [ 1017.421622][ T889] BPF: [ 1017.424390][ T889] BPF:Invalid return type [ 1017.428718][ T889] BPF: [ 1017.428718][ T889] 01:11:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:35 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x5}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1017.448237][ T891] BPF:[1] FUNC_PROTO (anon) [ 1017.455344][ T891] BPF:return=9728 args=( [ 1017.459604][ T891] BPF:0 (anon) [ 1017.464476][ T891] BPF:, 0 [ 1017.467510][ T891] BPF:, vararg [ 1017.472141][ T891] BPF:) [ 1017.474912][ T891] BPF: [ 1017.477673][ T891] BPF:Invalid return type [ 1017.482034][ T891] BPF: [ 1017.482034][ T891] [ 1017.535521][ T900] BPF:[1] FUNC_PROTO (anon) [ 1017.540149][ T900] BPF:return=0 args=( [ 1017.545404][ T900] BPF:167772160 (anon) [ 1017.549487][ T900] BPF:, 2 [ 1017.552552][ T900] BPF:) [ 1017.555322][ T900] BPF: [ 1017.558086][ T900] BPF:Invalid arg#1 [ 1017.561935][ T900] BPF: [ 1017.561935][ T900] 01:11:35 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x4800, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:35 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x11000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1017.697531][ T921] BPF:[1] FUNC_PROTO (anon) [ 1017.704302][ T921] BPF:return=0 args=( [ 1017.708315][ T921] BPF:5 [ 1017.712431][ T921] BPF:, vararg [ 1017.715817][ T921] BPF:) [ 1017.718585][ T921] BPF: [ 1017.722583][ T921] BPF:Invalid arg#1 [ 1017.726394][ T921] BPF: [ 1017.726394][ T921] [ 1017.779203][ T923] BPF:[1] FUNC_PROTO (anon) [ 1017.786406][ T923] BPF:return=0 args=( [ 1017.790401][ T923] BPF:5 [ 1017.794634][ T923] BPF:, vararg [ 1017.798013][ T923] BPF:) [ 1017.800773][ T923] BPF: [ 1017.803573][ T923] BPF:Invalid arg#1 [ 1017.807477][ T923] BPF: [ 1017.807477][ T923] 01:11:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x1000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:11:35 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x7, 0xa130, 0x780b, 0x7fffffff, 0x2edf981313fbd1b3, [0x8, 0xffffffe1, 0x1, 0x5], [0x3, 0x0, 0x8000, 0x7], [0x792455b8, 0xfffffff9, 0x5, 0x7], [0x3, 0x1, 0x8, 0x5]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000000)={0x6b, 0x2, 0x6}) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r4}) r5 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x52000, 0x0) ioctl$DRM_IOCTL_MODE_ATOMIC(r5, 0xc03864bc, &(0x7f00000002c0)={0x701, 0x1, &(0x7f00000001c0)=[0x6], &(0x7f0000000200)=[0x7, 0x9], &(0x7f0000000240)=[0x6, 0x7, 0x6, 0x9, 0xffffffff, 0x974, 0xb4], &(0x7f0000000280)=[0x10000, 0x81], 0x0, 0x4}) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000340)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x20000fbb, 0x1005, 0x8}) [ 1017.904806][ T940] device vlan1223 entered promiscuous mode [ 1017.936986][ T941] BPF:[1] FUNC_PROTO (anon) [ 1017.942779][ T941] BPF:return=18432 args=( [ 1017.947120][ T941] BPF:0 (anon) [ 1017.950499][ T941] BPF:, 0 [ 1017.954737][ T941] BPF:, vararg [ 1017.958119][ T941] BPF:) [ 1017.962057][ T941] BPF: [ 1017.965270][ T941] BPF:Invalid return type [ 1017.969598][ T941] BPF: [ 1017.969598][ T941] [ 1017.986540][ T953] BPF:[1] FUNC_PROTO (anon) [ 1017.992343][ T953] BPF:return=0 args=( [ 1017.996356][ T953] BPF:285212672 (anon) [ 1018.000431][ T953] BPF:, 2 [ 1018.003554][ T953] BPF:) [ 1018.006318][ T953] BPF: [ 1018.009075][ T953] BPF:Invalid arg#1 [ 1018.012975][ T953] BPF: [ 1018.012975][ T953] [ 1018.023299][ T955] BPF:[1] FUNC_PROTO (anon) [ 1018.027914][ T955] BPF:return=18432 args=( [ 1018.033685][ T955] BPF:0 (anon) [ 1018.037070][ T955] BPF:, 0 [ 1018.040094][ T955] BPF:, vararg [ 1018.043496][ T955] BPF:) [ 1018.046255][ T955] BPF: [ 1018.049040][ T955] BPF:Invalid return type 01:11:35 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x6}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1018.053430][ T955] BPF: [ 1018.053430][ T955] 01:11:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0xc, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:35 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x1c000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:35 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x4c00, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1018.285599][ T978] BPF:[1] FUNC_PROTO (anon) [ 1018.290276][ T978] BPF:return=0 args=( [ 1018.296325][ T978] BPF:6 [ 1018.299200][ T978] BPF:, vararg [ 1018.304022][ T978] BPF:) [ 1018.306803][ T978] BPF: [ 1018.309575][ T978] BPF:Invalid arg#1 [ 1018.313443][ T978] BPF: [ 1018.313443][ T978] 01:11:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x2000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1018.335335][ T987] BPF:[1] FUNC_PROTO (anon) [ 1018.339995][ T987] BPF:return=0 args=( [ 1018.346107][ T987] BPF:6 [ 1018.348974][ T987] BPF:, vararg [ 1018.353643][ T987] BPF:) [ 1018.356444][ T987] BPF: [ 1018.359213][ T987] BPF:Invalid arg#1 [ 1018.364329][ T987] BPF: [ 1018.364329][ T987] [ 1018.427834][ T996] BPF:[1] FUNC_PROTO (anon) [ 1018.433628][ T996] BPF:return=0 args=( [ 1018.437626][ T996] BPF:469762048 (anon) [ 1018.442955][ T996] BPF:, 2 [ 1018.445986][ T996] BPF:) [ 1018.448749][ T996] BPF: [ 1018.452625][ T996] BPF:Invalid arg#1 [ 1018.456448][ T996] BPF: [ 1018.456448][ T996] 01:11:35 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0xfffffbfe, 0x4, 0x2}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1018.476564][ T1003] device vlan1224 entered promiscuous mode [ 1018.488500][ T1005] BPF:[1] FUNC_PROTO (anon) [ 1018.494109][ T1005] BPF:return=0 args=( [ 1018.498152][ T1005] BPF:469762048 (anon) [ 1018.503179][ T1005] BPF:, 2 [ 1018.506209][ T1005] BPF:) [ 1018.508974][ T1005] BPF: [ 1018.512793][ T1005] BPF:Invalid arg#1 [ 1018.516639][ T1005] BPF: [ 1018.516639][ T1005] 01:11:36 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x7}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1018.607942][ T1011] BPF:[1] FUNC_PROTO (anon) [ 1018.613680][ T1011] BPF:return=19456 args=( [ 1018.618029][ T1011] BPF:0 (anon) [ 1018.622752][ T1011] BPF:, 0 [ 1018.625796][ T1011] BPF:, vararg [ 1018.629171][ T1011] BPF:) [ 1018.631982][ T1011] BPF: [ 1018.634749][ T1011] BPF:Invalid return type [ 1018.639082][ T1011] BPF: [ 1018.639082][ T1011] 01:11:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0xe, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:36 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x1e000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:36 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x6000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:36 executing program 0: clone(0x70e3ab50dd4e929c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1018.903578][ T1036] BPF:[1] FUNC_PROTO (anon) [ 1018.908258][ T1036] BPF:return=0 args=( [ 1018.913480][ T1036] BPF:7 [ 1018.916345][ T1036] BPF:, vararg [ 1018.919717][ T1036] BPF:) [ 1018.923885][ T1036] BPF: [ 1018.926672][ T1036] BPF:Invalid arg#1 [ 1018.930483][ T1036] BPF: [ 1018.930483][ T1036] [ 1018.967860][ T1039] BPF:[1] FUNC_PROTO (anon) [ 1018.973699][ T1039] BPF:return=0 args=( [ 1018.977698][ T1039] BPF:7 [ 1018.980549][ T1039] BPF:, vararg [ 1018.985245][ T1039] BPF:) [ 1018.988026][ T1039] BPF: [ 1018.990873][ T1039] BPF:Invalid arg#1 [ 1018.994691][ T1039] BPF: [ 1018.994691][ T1039] 01:11:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x40000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1019.156074][ T1051] BPF:[1] FUNC_PROTO (anon) [ 1019.162029][ T1051] BPF:return=0 args=( [ 1019.166028][ T1051] BPF:503316480 (anon) [ 1019.170115][ T1051] BPF:, 2 [ 1019.174383][ T1051] BPF:) [ 1019.177163][ T1051] BPF: [ 1019.179928][ T1051] BPF:Invalid arg#1 [ 1019.184875][ T1051] BPF: [ 1019.184875][ T1051] [ 1019.207456][ T1052] BPF:[1] FUNC_PROTO (anon) [ 1019.213189][ T1052] BPF:return=0 args=( [ 1019.213831][ T1050] device vlan1225 entered promiscuous mode [ 1019.217180][ T1052] BPF:503316480 (anon) [ 1019.228233][ T1052] BPF:, 2 [ 1019.232288][ T1052] BPF:) [ 1019.235068][ T1052] BPF: [ 1019.237829][ T1052] BPF:Invalid arg#1 [ 1019.242908][ T1052] BPF: [ 1019.242908][ T1052] 01:11:36 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x8}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1019.278410][ T1057] BPF:[1] FUNC_PROTO (anon) [ 1019.284214][ T1057] BPF:return=24576 args=( [ 1019.288578][ T1057] BPF:0 (anon) [ 1019.293081][ T1057] BPF:, 0 [ 1019.296115][ T1057] BPF:, vararg [ 1019.299486][ T1057] BPF:) [ 1019.303205][ T1057] BPF: [ 1019.306366][ T1057] BPF:Invalid return type [ 1019.311841][ T1057] BPF: [ 1019.311841][ T1057] [ 1019.328847][ T1065] BPF:[1] FUNC_PROTO (anon) [ 1019.335655][ T1065] BPF:return=24576 args=( [ 1019.340013][ T1065] BPF:0 (anon) [ 1019.344544][ T1065] BPF:, 0 [ 1019.347579][ T1065] BPF:, vararg [ 1019.352144][ T1065] BPF:) [ 1019.354911][ T1065] BPF: [ 1019.357684][ T1065] BPF:Invalid return type [ 1019.363300][ T1065] BPF: [ 1019.363300][ T1065] 01:11:37 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x1f000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:37 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r4 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r4, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) dup3(0xffffffffffffffff, r4, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r3, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r3, 0xc06864b8, &(0x7f00000001c0)={0x5, 0x0, 0xffff, 0x62f7973d, 0x2, [0x7, 0x3ff, 0x400, 0x8], [0x3f, 0xd2bc, 0x5e86932b, 0x3], [0x6, 0x4, 0x7, 0x7], [0xfffb, 0x401, 0x3f, 0x5]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r5}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:11:37 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x6800, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0xf, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1019.590034][ T1078] BPF:[1] FUNC_PROTO (anon) [ 1019.596209][ T1078] BPF:return=0 args=( [ 1019.600214][ T1078] BPF:8 [ 1019.603134][ T1078] BPF:, vararg [ 1019.606518][ T1078] BPF:) [ 1019.609295][ T1078] BPF: [ 1019.612232][ T1078] BPF:Invalid arg#1 [ 1019.616043][ T1078] BPF: [ 1019.616043][ T1078] [ 1019.634642][ T1079] BPF:[1] FUNC_PROTO (anon) [ 1019.639268][ T1079] BPF:return=0 args=( [ 1019.648575][ T1079] BPF:8 [ 1019.651531][ T1079] BPF:, vararg [ 1019.654905][ T1079] BPF:) [ 1019.657678][ T1079] BPF: [ 1019.660438][ T1079] BPF:Invalid arg#1 [ 1019.666734][ T1079] BPF: [ 1019.666734][ T1079] [ 1019.787916][ T1099] BPF:[1] FUNC_PROTO (anon) [ 1019.793639][ T1099] BPF:return=0 args=( [ 1019.797650][ T1099] BPF:520093696 (anon) [ 1019.803042][ T1099] BPF:, 2 [ 1019.806081][ T1099] BPF:) [ 1019.808851][ T1099] BPF: [ 1019.812943][ T1099] BPF:Invalid arg#1 [ 1019.816763][ T1099] BPF: [ 1019.816763][ T1099] [ 1019.830585][ T1101] BPF:[1] FUNC_PROTO (anon) 01:11:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x100000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1019.836549][ T1101] BPF:return=0 args=( [ 1019.840540][ T1101] BPF:520093696 (anon) [ 1019.845677][ T1101] BPF:, 2 [ 1019.848704][ T1101] BPF:) [ 1019.852706][ T1101] BPF: [ 1019.855483][ T1101] BPF:Invalid arg#1 [ 1019.859290][ T1101] BPF: [ 1019.859290][ T1101] 01:11:37 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0xa}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1019.928416][ T1107] BPF:[1] FUNC_PROTO (anon) [ 1019.934310][ T1107] BPF:return=26624 args=( [ 1019.938660][ T1107] BPF:0 (anon) [ 1019.943160][ T1107] BPF:, 0 [ 1019.946197][ T1107] BPF:, vararg [ 1019.949569][ T1107] BPF:) [ 1019.953147][ T1107] BPF: [ 1019.956007][ T1107] BPF:Invalid return type [ 1019.960343][ T1107] BPF: [ 1019.960343][ T1107] [ 1019.976655][ T1112] BPF:[1] FUNC_PROTO (anon) [ 1019.982356][ T1112] BPF:return=26624 args=( [ 1019.986466][ T1113] device vlan1226 entered promiscuous mode [ 1019.986706][ T1112] BPF:0 (anon) [ 1019.995938][ T1112] BPF:, 0 [ 1019.998968][ T1112] BPF:, vararg [ 1020.004623][ T1112] BPF:) [ 1020.007394][ T1112] BPF: [ 1020.010184][ T1112] BPF:Invalid return type [ 1020.015572][ T1112] BPF: [ 1020.015572][ T1112] 01:11:37 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000140)={0x2, 0x1, 0x1}) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:11:37 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x20000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1020.252393][ T1130] BPF:[1] FUNC_PROTO (anon) [ 1020.257017][ T1130] BPF:return=0 args=( [ 1020.263350][ T1130] BPF:10 [ 1020.266305][ T1130] BPF:, vararg [ 1020.269680][ T1130] BPF:) [ 1020.273510][ T1130] BPF: [ 1020.276283][ T1130] BPF:Invalid arg#1 [ 1020.280091][ T1130] BPF: [ 1020.280091][ T1130] 01:11:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x10, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:37 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x6c00, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1020.331530][ T1133] BPF:[1] FUNC_PROTO (anon) [ 1020.336158][ T1133] BPF:return=0 args=( [ 1020.340140][ T1133] BPF:10 [ 1020.345279][ T1133] BPF:, vararg [ 1020.348676][ T1133] BPF:) [ 1020.351491][ T1133] BPF: [ 1020.354257][ T1133] BPF:Invalid arg#1 [ 1020.358062][ T1133] BPF: [ 1020.358062][ T1133] 01:11:38 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x1c}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x1a0000200000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:11:38 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) r4 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r4, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000000)={0xfffffffe, 0xffff8c31, 0x9, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r4, 0xc00464b4, &(0x7f0000000140)={r5}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1020.622299][ T1156] BPF:[1] FUNC_PROTO (anon) [ 1020.626961][ T1156] BPF:return=0 args=( [ 1020.632266][ T1156] BPF:536870912 (anon) [ 1020.636656][ T1156] BPF:, 2 [ 1020.639684][ T1156] BPF:) [ 1020.642502][ T1156] BPF: [ 1020.645270][ T1156] BPF:Invalid arg#1 [ 1020.649080][ T1156] BPF: [ 1020.649080][ T1156] [ 1020.665494][ T1157] BPF:[1] FUNC_PROTO (anon) [ 1020.670133][ T1157] BPF:return=0 args=( [ 1020.676460][ T1157] BPF:536870912 (anon) [ 1020.680592][ T1157] BPF:, 2 [ 1020.683617][ T1157] BPF:) [ 1020.686380][ T1157] BPF: [ 1020.689148][ T1157] BPF:Invalid arg#1 [ 1020.692984][ T1157] BPF: [ 1020.692984][ T1157] [ 1020.720499][ T1167] BPF:[1] FUNC_PROTO (anon) [ 1020.727410][ T1167] BPF:return=27648 args=( [ 1020.732804][ T1167] BPF:0 (anon) [ 1020.736193][ T1167] BPF:, 0 [ 1020.739422][ T1167] BPF:, vararg [ 1020.742990][ T1167] BPF:) [ 1020.745758][ T1167] BPF: [ 1020.748517][ T1167] BPF:Invalid return type [ 1020.752872][ T1167] BPF: [ 1020.752872][ T1167] [ 1020.778306][ T1168] BPF:[1] FUNC_PROTO (anon) [ 1020.783504][ T1170] device vlan1227 entered promiscuous mode [ 1020.792095][ T1168] BPF:return=27648 args=( [ 1020.796437][ T1168] BPF:0 (anon) [ 1020.799811][ T1168] BPF:, 0 [ 1020.804082][ T1168] BPF:, vararg [ 1020.807459][ T1168] BPF:) [ 1020.810227][ T1168] BPF: [ 1020.814130][ T1168] BPF:Invalid return type [ 1020.818468][ T1168] BPF: [ 1020.818468][ T1168] 01:11:38 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x48000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1020.902630][ T1180] BPF:[1] FUNC_PROTO (anon) [ 1020.907321][ T1180] BPF:return=0 args=( [ 1020.912408][ T1180] BPF:28 [ 1020.915367][ T1180] BPF:, vararg [ 1020.918741][ T1180] BPF:) [ 1020.922677][ T1180] BPF: [ 1020.925452][ T1180] BPF:Invalid arg#1 [ 1020.929257][ T1180] BPF: [ 1020.929257][ T1180] [ 1020.953991][ T1183] BPF:[1] FUNC_PROTO (anon) [ 1020.958656][ T1183] BPF:return=0 args=( [ 1020.965148][ T1183] BPF:28 [ 1020.968107][ T1183] BPF:, vararg [ 1020.971531][ T1183] BPF:) [ 1020.974303][ T1183] BPF: [ 1020.977072][ T1183] BPF:Invalid arg#1 [ 1020.980931][ T1183] BPF: [ 1020.980931][ T1183] 01:11:38 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x7400, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x12, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x200000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1021.176775][ T1203] BPF:[1] FUNC_PROTO (anon) [ 1021.183668][ T1203] BPF:return=0 args=( [ 1021.187677][ T1203] BPF:1207959552 (anon) [ 1021.191915][ T1203] BPF:, 2 [ 1021.194945][ T1203] BPF:) [ 1021.197710][ T1203] BPF: [ 1021.200475][ T1203] BPF:Invalid arg#1 [ 1021.204352][ T1203] BPF: [ 1021.204352][ T1203] 01:11:38 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x1e}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1021.233401][ T1205] BPF:[1] FUNC_PROTO (anon) [ 1021.238018][ T1205] BPF:return=0 args=( [ 1021.243274][ T1205] BPF:1207959552 (anon) [ 1021.247443][ T1205] BPF:, 2 [ 1021.250720][ T1205] BPF:) [ 1021.253488][ T1205] BPF: [ 1021.256244][ T1205] BPF:Invalid arg#1 [ 1021.260045][ T1205] BPF: [ 1021.260045][ T1205] 01:11:38 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000000)={0x7, 0x200, 0x3}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:11:38 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x4c000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1021.355707][ T1210] BPF:[1] FUNC_PROTO (anon) [ 1021.360382][ T1210] BPF:return=29696 args=( [ 1021.365992][ T1210] BPF:0 (anon) [ 1021.369400][ T1210] BPF:, 0 [ 1021.373528][ T1210] BPF:, vararg [ 1021.376917][ T1210] BPF:) [ 1021.379688][ T1210] BPF: [ 1021.383932][ T1210] BPF:Invalid return type [ 1021.388274][ T1210] BPF: [ 1021.388274][ T1210] [ 1021.419880][ T1215] BPF:[1] FUNC_PROTO (anon) [ 1021.425810][ T1215] BPF:return=29696 args=( [ 1021.430145][ T1215] BPF:0 (anon) [ 1021.433598][ T1215] BPF:, 0 [ 1021.436622][ T1215] BPF:, vararg [ 1021.439992][ T1215] BPF:) [ 1021.442825][ T1215] BPF: [ 1021.445587][ T1215] BPF:Invalid return type [ 1021.449913][ T1215] BPF: [ 1021.449913][ T1215] [ 1021.529540][ T1211] device vlan1228 entered promiscuous mode 01:11:39 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x7a00, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1021.692663][ T1245] BPF:[1] FUNC_PROTO (anon) [ 1021.697338][ T1245] BPF:return=0 args=( [ 1021.702668][ T1245] BPF:30 [ 1021.705625][ T1245] BPF:, vararg [ 1021.709001][ T1245] BPF:) [ 1021.712914][ T1245] BPF: [ 1021.715749][ T1245] BPF:Invalid arg#1 [ 1021.719551][ T1245] BPF: [ 1021.719551][ T1245] [ 1021.748034][ T1251] BPF:[1] FUNC_PROTO (anon) [ 1021.753889][ T1251] BPF:return=0 args=( [ 1021.757885][ T1251] BPF:30 [ 1021.762062][ T1251] BPF:, vararg [ 1021.765647][ T1251] BPF:) [ 1021.768410][ T1251] BPF: [ 1021.772326][ T1251] BPF:Invalid arg#1 [ 1021.776227][ T1251] BPF: [ 1021.776227][ T1251] [ 1021.783347][ T1250] BPF:[1] FUNC_PROTO (anon) [ 1021.788007][ T1250] BPF:return=0 args=( [ 1021.793282][ T1250] BPF:1275068416 (anon) 01:11:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x300000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:11:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x19, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1021.797458][ T1250] BPF:, 2 [ 1021.801956][ T1250] BPF:) [ 1021.804735][ T1250] BPF: [ 1021.807502][ T1250] BPF:Invalid arg#1 [ 1021.812430][ T1250] BPF: [ 1021.812430][ T1250] 01:11:39 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r4}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5, 0x4}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r5, 0xc00464b4, &(0x7f00000002c0)={r2}) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r6, 0xc02064b2, &(0x7f0000000140)={0x100, 0x1ff, 0x80000001}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) r7 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000240)={0x4, &(0x7f0000000200)=[{}, {}, {}, {}]}) 01:11:39 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x60000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:39 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x2e}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1022.016149][ T1264] BPF:[1] FUNC_PROTO (anon) [ 1022.022009][ T1264] BPF:return=31232 args=( [ 1022.026443][ T1264] BPF:0 (anon) [ 1022.029827][ T1264] BPF:, 0 [ 1022.033938][ T1264] BPF:, vararg [ 1022.037326][ T1264] BPF:) [ 1022.040093][ T1264] BPF: [ 1022.044287][ T1264] BPF:Invalid return type [ 1022.048630][ T1264] BPF: [ 1022.048630][ T1264] [ 1022.069929][ T1265] BPF:[1] FUNC_PROTO (anon) [ 1022.075770][ T1265] BPF:return=31232 args=( [ 1022.080110][ T1265] BPF:0 (anon) [ 1022.084684][ T1265] BPF:, 0 [ 1022.087725][ T1265] BPF:, vararg [ 1022.092107][ T1265] BPF:) [ 1022.094878][ T1265] BPF: [ 1022.097637][ T1265] BPF:Invalid return type [ 1022.103083][ T1265] BPF: [ 1022.103083][ T1265] [ 1022.156405][ T1277] device vlan1229 entered promiscuous mode 01:11:39 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xd200, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1022.364580][ T1299] BPF:[1] FUNC_PROTO (anon) [ 1022.369235][ T1299] BPF:return=0 args=( [ 1022.375685][ T1299] BPF:1610612736 (anon) [ 1022.380051][ T1299] BPF:, 2 [ 1022.384415][ T1299] BPF:) [ 1022.387196][ T1299] BPF: [ 1022.389963][ T1299] BPF:Invalid arg#1 [ 1022.393841][ T1299] BPF: [ 1022.393841][ T1299] [ 1022.411932][ T1301] BPF:[1] FUNC_PROTO (anon) [ 1022.416574][ T1301] BPF:return=0 args=( [ 1022.421722][ T1301] BPF:1610612736 (anon) [ 1022.425886][ T1301] BPF:, 2 [ 1022.428926][ T1301] BPF:) [ 1022.432859][ T1301] BPF: [ 1022.435636][ T1301] BPF:Invalid arg#1 [ 1022.439525][ T1301] BPF: [ 1022.439525][ T1301] [ 1022.457328][ T1305] BPF:[1] FUNC_PROTO (anon) 01:11:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x400000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:11:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x2c, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1022.464186][ T1305] BPF:return=0 args=( [ 1022.468178][ T1305] BPF:46 [ 1022.472427][ T1305] BPF:, vararg [ 1022.475819][ T1305] BPF:) [ 1022.478586][ T1305] BPF: [ 1022.482694][ T1305] BPF:Invalid arg#1 [ 1022.486511][ T1305] BPF: [ 1022.486511][ T1305] [ 1022.507862][ T1308] BPF:[1] FUNC_PROTO (anon) [ 1022.514956][ T1308] BPF:return=0 args=( [ 1022.518939][ T1308] BPF:46 [ 1022.523445][ T1308] BPF:, vararg [ 1022.526829][ T1308] BPF:) [ 1022.529597][ T1308] BPF: [ 1022.532433][ T1308] BPF:Invalid arg#1 [ 1022.536242][ T1308] BPF: [ 1022.536242][ T1308] 01:11:40 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x68000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:40 executing program 0: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_POWER_SAVE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r0}, @void}}}, 0x1c}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_POWER_SAVE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="0100000000000000007dd2000000080003008ab526f23355a0b14536e81c308b0520e0b3d5aafda665af15c3834c7a0f1dd6b958739e275e5d17d2571e6b85277cc9c060c6a2ae3ab07d95349a787b0874cab9e52c6d71feda564110eb6488a6f1b3dcda74735e408a01a40fae823e51fef90159d4", @ANYRES32=r3, @ANYBLOB="1dd6ceb09402b35fc9f560307ea363c6fb37152abc12dcfbb60aaae3837f7ee16eb20a81aba652bba3134c13129e9e7be1ef6f74640812932c1adf26cf247212bd"], 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x100, 0x70bd2a, 0x25dfdbff, {{}, {@void, @val={0x8, 0x3, r3}, @void}}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4061}, 0x88005) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r5 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r6 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x48c800, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r6, 0xc06864a2, &(0x7f00000001c0)={&(0x7f0000000140)=[0x6], 0x1, 0x7, 0x5a6, 0x6e, 0x2, 0x6e55a15c, 0x1, {0x6, 0x8, 0x1f, 0x5, 0x9b, 0x6, 0x8, 0x8, 0x20, 0x0, 0x1, 0x80, 0x1, 0x2, "11eba1fcff8fd023331889099bf1f9a46d8883510fbc72e1ef8d590541b5b68c"}}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r7 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r7, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r5, 0xc00464b4, &(0x7f0000000300)={r8}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) fchmod(r6, 0x25) 01:11:40 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x48}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1022.692246][ T1315] BPF:[1] FUNC_PROTO (anon) [ 1022.696866][ T1315] BPF:return=53760 args=( [ 1022.702316][ T1315] BPF:0 (anon) [ 1022.705710][ T1315] BPF:, 0 [ 1022.708743][ T1315] BPF:, vararg [ 1022.713493][ T1315] BPF:) [ 1022.716273][ T1315] BPF: [ 1022.719044][ T1315] BPF:Invalid return type [ 1022.724540][ T1315] BPF: [ 1022.724540][ T1315] [ 1022.747269][ T1318] BPF:[1] FUNC_PROTO (anon) [ 1022.753033][ T1318] BPF:return=53760 args=( [ 1022.757376][ T1318] BPF:0 (anon) [ 1022.765966][ T1318] BPF:, 0 [ 1022.769007][ T1318] BPF:, vararg [ 1022.773579][ T1318] BPF:) [ 1022.776365][ T1318] BPF: [ 1022.779122][ T1318] BPF:Invalid return type [ 1022.784533][ T1318] BPF: [ 1022.784533][ T1318] 01:11:40 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MARK_BUFS(r2, 0x40206417, &(0x7f0000000140)={0xfffffffe, 0x0, 0xfffffffa, 0x3ff, 0x0, 0x20}) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r4}) r5 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r5, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1022.888967][ T1324] device vlan1230 entered promiscuous mode 01:11:40 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xfffff, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1023.013265][ T1344] BPF:[1] FUNC_PROTO (anon) [ 1023.017920][ T1344] BPF:return=0 args=( [ 1023.023093][ T1344] BPF:1744830464 (anon) [ 1023.027274][ T1344] BPF:, 2 [ 1023.031614][ T1344] BPF:) [ 1023.034390][ T1344] BPF: [ 1023.037164][ T1344] BPF:Invalid arg#1 [ 1023.042566][ T1344] BPF: [ 1023.042566][ T1344] [ 1023.062768][ T1345] BPF:[1] FUNC_PROTO (anon) [ 1023.067389][ T1345] BPF:return=0 args=( [ 1023.072324][ T1345] BPF:1744830464 (anon) [ 1023.073369][ T1348] BPF:[1] FUNC_PROTO (anon) [ 1023.076517][ T1345] BPF:, 2 [ 1023.076528][ T1345] BPF:) [ 1023.076536][ T1345] BPF: [ 1023.076545][ T1345] BPF:Invalid arg#1 [ 1023.076554][ T1345] BPF: [ 1023.076554][ T1345] [ 1023.099827][ T1348] BPF:return=0 args=( [ 1023.103902][ T1348] BPF:72 [ 1023.106843][ T1348] BPF:, vararg [ 1023.110216][ T1348] BPF:) [ 1023.113054][ T1348] BPF: [ 1023.115822][ T1348] BPF:Invalid arg#1 [ 1023.119630][ T1348] BPF: [ 1023.119630][ T1348] [ 1023.165166][ T1359] BPF:[1] FUNC_PROTO (anon) [ 1023.169823][ T1359] BPF:return=0 args=( [ 1023.174890][ T1359] BPF:72 [ 1023.177844][ T1359] BPF:, vararg [ 1023.182646][ T1359] BPF:) [ 1023.185416][ T1359] BPF: [ 1023.188182][ T1359] BPF:Invalid arg#1 [ 1023.193004][ T1359] BPF: [ 1023.193004][ T1359] 01:11:40 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x4, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f0000000340)={{r0}, 0x0, 0x18, @inherit={0x50, &(0x7f0000001400)=ANY=[@ANYBLOB="01000000000000000100000000000000804b5541000000000001000000000000190020000000000004008ebda65bf0e8cb880000000000000700000000000000f07c81a5a36f68714000000000000000"]}, @devid}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x102, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f00000001c0)={0x5, 0x5, 0x0, 0x7ffe, 0x3, [0x9, 0x100, 0x9, 0x3], [0x1000, 0x81, 0x3, 0xfa67], [0x6, 0x4, 0x0, 0x1ff], [0x8, 0x3, 0x2, 0x2]}) clone(0x20000, &(0x7f0000000140)="4091142adfab7ed25db6b98ef93aa7033b9dc3e49346128e0aafc9a2eb4a717a9cba861eb3d9471117d8847896e5e78a4cda1532ba1c6e077f00d7525e38c8", &(0x7f0000000240), &(0x7f0000000280), &(0x7f0000001340)="81e31ff95da6ba0388c3aa7e2beb87395e3212e0aa31cad05b1785ab433382b75427c888cdd0a41b3269171414afa20f415aa5c10fdf78ba9e40a44abccfcdfe517f9f84d85be4f7d1d7f18396") r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x4005, 0x8044, 0xd7, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001480)=ANY=[@ANYBLOB="0900000000d65ad9199e9093b28a4789304f522900"/32, @ANYRES32=r0, @ANYBLOB="0455809de41e000000000000003915bccb6c652e007d934cb1063987f24c95cdae6b0e9b84e3fab9989b0427194b6f424ae0b910c21674eed44da936d4c5d10aa4b70de246acef041f460e89576e5b"]) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r5, 0xc00464b4, &(0x7f00000013c0)) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000300)={r4}) r6 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x4c82) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f00000002c0)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x40000400, 0x0, 0x4}) ioctl$DRM_IOCTL_MODE_ADDFB2(r6, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x20000800, 0x0, 0x1], [0x0, 0x0, 0x0, 0x9], [0x0, 0x340]}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r6, 0xc01064b3, &(0x7f0000000000)={r1}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:11:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x48, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:40 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x6c000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x500000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1023.393115][ T1370] BPF:[1] FUNC_PROTO (anon) [ 1023.397738][ T1370] BPF:return=1048575 args=( [ 1023.403527][ T1370] BPF:0 (anon) [ 1023.406919][ T1370] BPF:, 0 [ 1023.409946][ T1370] BPF:, vararg [ 1023.414453][ T1370] BPF:) [ 1023.416166][ T1371] BPF:[1] FUNC_PROTO (anon) [ 1023.417252][ T1370] BPF: [ 1023.417263][ T1370] BPF:Invalid return type [ 1023.417273][ T1370] BPF: [ 1023.417273][ T1370] [ 1023.436191][ T1371] BPF:return=1048575 args=( [ 1023.441981][ T1371] BPF:0 (anon) [ 1023.445359][ T1371] BPF:, 0 [ 1023.448381][ T1371] BPF:, vararg [ 1023.452857][ T1371] BPF:) [ 1023.455634][ T1371] BPF: [ 1023.458395][ T1371] BPF:Invalid return type [ 1023.463849][ T1371] BPF: [ 1023.463849][ T1371] 01:11:41 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xffffff, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1023.627036][ T1381] BPF:[1] FUNC_PROTO (anon) [ 1023.632766][ T1381] BPF:return=0 args=( [ 1023.636772][ T1381] BPF:1811939328 (anon) [ 1023.642297][ T1381] BPF:, 2 [ 1023.645338][ T1381] BPF:) [ 1023.648104][ T1381] BPF: [ 1023.651913][ T1381] BPF:Invalid arg#1 [ 1023.655731][ T1381] BPF: [ 1023.655731][ T1381] [ 1023.656057][ T1386] device vlan1231 entered promiscuous mode 01:11:41 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x4c}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1023.703859][ T1383] BPF:[1] FUNC_PROTO (anon) [ 1023.708664][ T1383] BPF:return=0 args=( [ 1023.713809][ T1383] BPF:1811939328 (anon) [ 1023.717982][ T1383] BPF:, 2 [ 1023.721042][ T1383] BPF:) [ 1023.723817][ T1383] BPF: [ 1023.726586][ T1383] BPF:Invalid arg#1 [ 1023.730432][ T1383] BPF: [ 1023.730432][ T1383] [ 1023.925523][ T1408] BPF:[1] FUNC_PROTO (anon) [ 1023.930186][ T1408] BPF:return=16777215 args=( [ 1023.937390][ T1408] BPF:0 (anon) [ 1023.942019][ T1408] BPF:, 0 [ 1023.945058][ T1408] BPF:, vararg [ 1023.948433][ T1408] BPF:) [ 1023.952291][ T1408] BPF: [ 1023.955063][ T1408] BPF:Invalid return type [ 1023.959393][ T1408] BPF: [ 1023.959393][ T1408] 01:11:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x4a, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x600000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1023.975072][ T1413] BPF:[1] FUNC_PROTO (anon) [ 1023.979746][ T1413] BPF:return=16777215 args=( [ 1023.986726][ T1413] BPF:0 (anon) [ 1023.990112][ T1413] BPF:, 0 [ 1023.994191][ T1413] BPF:, vararg [ 1023.997570][ T1413] BPF:) [ 1024.001448][ T1413] BPF: [ 1024.004216][ T1413] BPF:Invalid return type [ 1024.008540][ T1413] BPF: [ 1024.008540][ T1413] 01:11:41 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x74000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1024.108989][ T1415] BPF:[1] FUNC_PROTO (anon) [ 1024.111366][ T1417] BPF:[1] FUNC_PROTO (anon) [ 1024.114599][ T1415] BPF:return=0 args=( [ 1024.118436][ T1417] BPF:return=0 args=( [ 1024.118453][ T1417] BPF:76 [ 1024.118462][ T1417] BPF:, vararg [ 1024.118471][ T1417] BPF:) [ 1024.118479][ T1417] BPF: [ 1024.118488][ T1417] BPF:Invalid arg#1 [ 1024.118497][ T1417] BPF: [ 1024.118497][ T1417] [ 1024.148567][ T1415] BPF:76 [ 1024.151551][ T1415] BPF:, vararg [ 1024.154924][ T1415] BPF:) 01:11:41 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1024.157690][ T1415] BPF: [ 1024.160494][ T1415] BPF:Invalid arg#1 [ 1024.164300][ T1415] BPF: [ 1024.164300][ T1415] 01:11:41 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x1000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1024.229618][ T1421] BPF:[1] FUNC_PROTO (anon) [ 1024.235531][ T1421] BPF:return=0 args=( [ 1024.239530][ T1421] BPF:1946157056 (anon) [ 1024.244900][ T1421] BPF:, 2 [ 1024.247940][ T1421] BPF:) [ 1024.251824][ T1421] BPF: [ 1024.254599][ T1421] BPF:Invalid arg#1 [ 1024.258409][ T1421] BPF: [ 1024.258409][ T1421] [ 1024.276874][ T1424] BPF:[1] FUNC_PROTO (anon) [ 1024.284107][ T1424] BPF:return=0 args=( [ 1024.288098][ T1424] BPF:1946157056 (anon) [ 1024.292334][ T1424] BPF:, 2 [ 1024.295358][ T1424] BPF:) [ 1024.298122][ T1424] BPF: [ 1024.300959][ T1424] BPF:Invalid arg#1 [ 1024.304768][ T1424] BPF: [ 1024.304768][ T1424] [ 1024.349846][ T1434] device vlan1232 entered promiscuous mode 01:11:42 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x7a000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x700000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:11:42 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x5f}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1024.562977][ T1457] BPF:[1] FUNC_PROTO (anon) [ 1024.567638][ T1457] BPF:return=16777216 args=( [ 1024.573446][ T1457] BPF:0 (anon) [ 1024.576841][ T1457] BPF:, 0 [ 1024.579865][ T1457] BPF:, vararg [ 1024.584661][ T1457] BPF:) [ 1024.587471][ T1457] BPF: [ 1024.590304][ T1457] BPF:Invalid return type [ 1024.594635][ T1457] BPF: [ 1024.594635][ T1457] 01:11:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x4c, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:42 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000000), 0xba4b, 0x1) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1024.623631][ T1458] BPF:[1] FUNC_PROTO (anon) [ 1024.628353][ T1458] BPF:return=16777216 args=( [ 1024.634405][ T1458] BPF:0 (anon) [ 1024.637798][ T1458] BPF:, 0 [ 1024.642037][ T1458] BPF:, vararg [ 1024.645421][ T1458] BPF:) [ 1024.648185][ T1458] BPF: [ 1024.651001][ T1458] BPF:Invalid return type [ 1024.655331][ T1458] BPF: [ 1024.655331][ T1458] [ 1024.749283][ T1465] BPF:[1] FUNC_PROTO (anon) [ 1024.755273][ T1465] BPF:return=0 args=( [ 1024.759276][ T1465] BPF:2046820352 (anon) [ 1024.764748][ T1465] BPF:, 2 [ 1024.767801][ T1465] BPF:) [ 1024.771734][ T1465] BPF: [ 1024.774513][ T1465] BPF:Invalid arg#1 [ 1024.778322][ T1465] BPF: [ 1024.778322][ T1465] 01:11:42 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x2000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1024.807136][ T1469] BPF:[1] FUNC_PROTO (anon) [ 1024.812922][ T1469] BPF:return=0 args=( [ 1024.816926][ T1469] BPF:2046820352 (anon) [ 1024.822547][ T1469] BPF:, 2 [ 1024.825594][ T1469] BPF:) [ 1024.828366][ T1469] BPF: [ 1024.831185][ T1469] BPF:Invalid arg#1 [ 1024.835002][ T1469] BPF: [ 1024.835002][ T1469] [ 1024.872720][ T1474] BPF:[1] FUNC_PROTO (anon) [ 1024.877403][ T1474] BPF:return=0 args=( [ 1024.883626][ T1474] BPF:95 [ 1024.886584][ T1474] BPF:, vararg [ 1024.889961][ T1474] BPF:) [ 1024.894057][ T1474] BPF: [ 1024.896838][ T1474] BPF:Invalid arg#1 [ 1024.900693][ T1474] BPF: [ 1024.900693][ T1474] 01:11:42 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000140)={0x1, 0x8, 0x1}) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) gettid() ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f0000000000)={r1}) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x9, 0x2000005, 0x6, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000300)={r4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1024.927670][ T1480] BPF:[1] FUNC_PROTO (anon) [ 1024.933661][ T1480] BPF:return=0 args=( [ 1024.938017][ T1480] BPF:95 [ 1024.942147][ T1480] BPF:, vararg [ 1024.945573][ T1480] BPF:) [ 1024.948339][ T1480] BPF: [ 1024.951177][ T1480] BPF:Invalid arg#1 [ 1024.955016][ T1480] BPF: [ 1024.955016][ T1480] [ 1024.992705][ T1489] device vlan1233 entered promiscuous mode 01:11:42 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x60}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:42 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0xd2000000}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1025.113970][ T1503] BPF:[1] FUNC_PROTO (anon) [ 1025.118665][ T1503] BPF:return=33554432 args=( [ 1025.124667][ T1503] BPF:0 (anon) [ 1025.128062][ T1503] BPF:, 0 [ 1025.132337][ T1503] BPF:, vararg [ 1025.135722][ T1503] BPF:) [ 1025.138482][ T1503] BPF: [ 1025.142547][ T1503] BPF:Invalid return type [ 1025.146903][ T1503] BPF: [ 1025.146903][ T1503] 01:11:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x60, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x800000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1025.178801][ T1506] BPF:[1] FUNC_PROTO (anon) [ 1025.184867][ T1506] BPF:return=33554432 args=( [ 1025.189474][ T1506] BPF:0 (anon) [ 1025.194178][ T1506] BPF:, 0 [ 1025.197211][ T1506] BPF:, vararg [ 1025.200658][ T1506] BPF:) [ 1025.203510][ T1506] BPF: [ 1025.206274][ T1506] BPF:Invalid return type [ 1025.210687][ T1506] BPF: [ 1025.210687][ T1506] [ 1025.308400][ T1515] BPF:[1] FUNC_PROTO (anon) [ 1025.314202][ T1515] BPF:return=0 args=( [ 1025.318218][ T1515] BPF:3523215360 (anon) [ 1025.323854][ T1515] BPF:, 2 [ 1025.326899][ T1515] BPF:) [ 1025.329942][ T1515] BPF: [ 1025.333898][ T1515] BPF:Invalid arg#1 [ 1025.337711][ T1515] BPF: [ 1025.337711][ T1515] [ 1025.364098][ T1517] BPF:[1] FUNC_PROTO (anon) [ 1025.368756][ T1517] BPF:return=0 args=( [ 1025.375236][ T1517] BPF:3523215360 (anon) [ 1025.379408][ T1517] BPF:, 2 [ 1025.383496][ T1517] BPF:) [ 1025.386268][ T1517] BPF: [ 1025.389202][ T1517] BPF:Invalid arg#1 [ 1025.393970][ T1517] BPF: [ 1025.393970][ T1517] 01:11:42 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x801000, &(0x7f00000001c0)="9023f9b711a228f027eedea2ab4e8f0e108f65610938b76a7ac6e1115b412231e5f03eb8432639e4eb72208a93cb211be225a5f1b3e2e8aecdfe5de2dc0563595f5cb029c2b639df58533964f41ebe0aafac48fe59f124882f4022ef9e2cf9bc12ec7a8bb3a9b3b7aa33baef43260dd12d73fc9c038212cad5b2217f3cc84ce96de2d156988d34fce93c82bf9ceb3313db2d684fbdca4609a92af50c16a645dc0547c47f3605ad6436ee38241f34e25b36fca66e191ca92af8a0b36b455ccb7fe3de5bb9350c7d9fd8deba3bcfae7dd433231af36b1b6475ea080f81", &(0x7f0000000000), &(0x7f0000002700), &(0x7f0000000340)="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") clone(0x80100000, &(0x7f0000002740)="d740762c9a50e33b758101e09682c4d4f0666fcfb5dd2eaf4312fe45a64c22bc14f73dcf2bfc6e1f268b08e4fa76b10a85287b0c322fb35a424e31dabd7b34ae7d418b5ccd7a47cc98394057458a7d503493", &(0x7f0000001340), &(0x7f0000001380), &(0x7f00000013c0)="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") clone(0x60010880, &(0x7f0000002500)="e7a0e248d0a4496ec01c227e94ba0f137d27af16955d6b35e0d5f5ed05221a8dc76be182f0f8052bb7a876aef0291324adb41a62b6553a34f7523b89c8a8984262a5bcb3168fcf4ad6d481e8f224c042c45d9e15862127a75ba29f0a88a91f2aac8f4b0b4f3b9548878be79c5f112e3bbb9f021064cd34f44d883fcea8", &(0x7f0000002580), &(0x7f00000025c0), &(0x7f0000002600)="ce91acd1ba7dede89f0d319ddaf93a7adbdc197d7e4e39e3832f422d6cc130abb5b2f6bf67967be7be0df6aac2a1412095ebb2c2576a233b7f7e743e375a5d6a03a625a08dad6f935877887cfcdafca659d2fdfdf02897ab28d59bac9e68dbe4c1a598579ae83e69f27384b95ec2ad64479cbbfa5889fb765621be801eb3aa53a5461e271cf1fbdb92f19e6d712dc749343a710a4697a1fc9aa6ecfba0ab0ea1699a9c8840578b1429664f1c22d247e86480b075317140ed79c41ead229af19d6a8dd2729530e9b8024603f2ece9b8736de2456f68ee87bbc73b35e775894e8713e9dbab80bea89e9dbb7ba0c37cf3") r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) close(r1) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000024c0)={0x6, 0x13b0, 0x8}) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r4}) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f00000002c0)={0xfffffffc, 0x1, {0xffffffffffffffff}, {}, 0x1870abfc, 0x5e}) ptrace$setregs(0xd, r5, 0x9, &(0x7f00000014c0)="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") ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:11:43 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x3000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1025.456605][ T1521] BPF:[1] FUNC_PROTO (anon) [ 1025.462320][ T1521] BPF:return=0 args=( [ 1025.466319][ T1521] BPF:96 [ 1025.469274][ T1521] BPF:, vararg [ 1025.473743][ T1521] BPF:) [ 1025.476528][ T1521] BPF: [ 1025.479729][ T1521] BPF:Invalid arg#1 [ 1025.484916][ T1521] BPF: [ 1025.484916][ T1521] [ 1025.504064][ T1522] BPF:[1] FUNC_PROTO (anon) [ 1025.508714][ T1522] BPF:return=0 args=( [ 1025.513907][ T1522] BPF:96 [ 1025.516855][ T1522] BPF:, vararg [ 1025.521484][ T1522] BPF:) [ 1025.524264][ T1522] BPF: [ 1025.527071][ T1522] BPF:Invalid arg#1 [ 1025.531853][ T1522] BPF: [ 1025.531853][ T1522] 01:11:43 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0xffff0f00}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1025.605442][ T1531] device vlan1234 entered promiscuous mode 01:11:43 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x100, 0x0) gettid() ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000000)={0xf73, 0x202002, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x0, 0x400400) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) r4 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r4, 0xc00464b4, &(0x7f0000000300)={r3}) r5 = openat2(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0xc0, 0xc2, 0x16}, 0x18) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000240)={0x0, 0x0, r2}) r6 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r6, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r6, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r6, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r6, 0xc02064b2, &(0x7f0000000280)={0x3, 0x7, 0x4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:11:43 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x68}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x900000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1025.814707][ T1556] BPF:[1] FUNC_PROTO (anon) [ 1025.819386][ T1556] BPF:return=50331648 args=( [ 1025.825281][ T1556] BPF:0 (anon) [ 1025.828671][ T1556] BPF:, 0 [ 1025.831789][ T1556] BPF:, vararg [ 1025.835163][ T1556] BPF:) [ 1025.837926][ T1556] BPF: [ 1025.840768][ T1556] BPF:Invalid return type [ 1025.845095][ T1556] BPF: [ 1025.845095][ T1556] 01:11:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x68, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1025.862022][ T1557] BPF:[1] FUNC_PROTO (anon) [ 1025.866634][ T1557] BPF:return=50331648 args=( [ 1025.872693][ T1557] BPF:0 (anon) [ 1025.876086][ T1557] BPF:, 0 [ 1025.879117][ T1557] BPF:, vararg [ 1025.887776][ T1557] BPF:) [ 1025.891691][ T1557] BPF: [ 1025.894459][ T1557] BPF:Invalid return type [ 1025.898787][ T1557] BPF: [ 1025.898787][ T1557] [ 1025.933716][ T1565] BPF:[1] FUNC_PROTO (anon) [ 1025.938340][ T1565] BPF:return=0 args=( [ 1025.943690][ T1565] BPF:4294905600 (anon) [ 1025.947881][ T1565] BPF:, 2 [ 1025.947893][ T1565] BPF:) [ 1025.947903][ T1565] BPF: 01:11:43 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0xffffff00}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1025.947913][ T1565] BPF:Invalid arg#1 [ 1025.947924][ T1565] BPF: [ 1025.947924][ T1565] [ 1025.965833][ T1567] BPF:[1] FUNC_PROTO (anon) [ 1025.965851][ T1567] BPF:return=0 args=( 01:11:43 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x6c}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1025.965863][ T1567] BPF:4294905600 (anon) [ 1025.965874][ T1567] BPF:, 2 [ 1025.965883][ T1567] BPF:) 01:11:43 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x4000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1025.965891][ T1567] BPF: [ 1025.965899][ T1567] BPF:Invalid arg#1 [ 1025.965908][ T1567] BPF: [ 1025.965908][ T1567] [ 1026.113340][ T1573] BPF:[1] FUNC_PROTO (anon) 01:11:43 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x2, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1026.113358][ T1573] BPF:return=0 args=( 01:11:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x1000000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:11:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x6c, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1026.113370][ T1573] BPF:104 [ 1026.113377][ T1573] BPF:, vararg 01:11:43 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x5000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:43 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x74}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1026.113385][ T1573] BPF:) [ 1026.113391][ T1573] BPF: [ 1026.113399][ T1573] BPF:Invalid arg#1 [ 1026.113407][ T1573] BPF: [ 1026.113407][ T1573] [ 1026.116332][ T1573] BPF:[1] FUNC_PROTO (anon) [ 1026.116350][ T1573] BPF:return=0 args=( [ 1026.116361][ T1573] BPF:104 [ 1026.116370][ T1573] BPF:, vararg [ 1026.116379][ T1573] BPF:) [ 1026.116387][ T1573] BPF: [ 1026.116396][ T1573] BPF:Invalid arg#1 [ 1026.116406][ T1573] BPF: [ 1026.116406][ T1573] [ 1026.204999][ T1583] device vlan1235 entered promiscuous mode [ 1026.305972][ T1603] BPF:[1] FUNC_PROTO (anon) [ 1026.305991][ T1603] BPF:return=0 args=( [ 1026.306035][ T1603] BPF:4294967040 (anon) [ 1026.306050][ T1603] BPF:, 2 [ 1026.306058][ T1603] BPF:) [ 1026.306068][ T1603] BPF: [ 1026.306079][ T1603] BPF:Invalid arg#1 [ 1026.306089][ T1603] BPF: [ 1026.306089][ T1603] [ 1026.442981][ T1617] BPF:[1] FUNC_PROTO (anon) [ 1026.443003][ T1617] BPF:return=67108864 args=( [ 1026.443017][ T1617] BPF:0 (anon) [ 1026.443029][ T1617] BPF:, 0 [ 1026.443039][ T1617] BPF:, vararg [ 1026.443049][ T1617] BPF:) [ 1026.443058][ T1617] BPF: [ 1026.443067][ T1617] BPF:Invalid return type [ 1026.443077][ T1617] BPF: [ 1026.443077][ T1617] [ 1026.461978][ T1619] BPF:[1] FUNC_PROTO (anon) [ 1026.461998][ T1619] BPF:return=0 args=( [ 1026.462011][ T1619] BPF:108 [ 1026.462021][ T1619] BPF:, vararg [ 1026.462031][ T1619] BPF:) [ 1026.462041][ T1619] BPF: [ 1026.462051][ T1619] BPF:Invalid arg#1 [ 1026.462061][ T1619] BPF: [ 1026.462061][ T1619] [ 1026.537749][ T1627] BPF:[1] FUNC_PROTO (anon) [ 1026.537770][ T1627] BPF:return=0 args=( [ 1026.537784][ T1627] BPF:0 (anon) [ 1026.537797][ T1627] BPF:, 2 (invalid-name-offset) [ 1026.537807][ T1627] BPF:) [ 1026.537816][ T1627] BPF: [ 1026.537826][ T1627] BPF:Invalid arg#1 [ 1026.537835][ T1627] BPF: [ 1026.537835][ T1627] [ 1026.703502][ T1643] BPF:[1] FUNC_PROTO (anon) [ 1026.703522][ T1643] BPF:return=83886080 args=( [ 1026.703535][ T1643] BPF:0 (anon) [ 1026.703547][ T1643] BPF:, 0 [ 1026.703557][ T1643] BPF:, vararg [ 1026.703566][ T1643] BPF:) [ 1026.703575][ T1643] BPF: [ 1026.703584][ T1643] BPF:Invalid return type [ 1026.703594][ T1643] BPF: [ 1026.703594][ T1643] [ 1026.719089][ T1638] device vlan1236 entered promiscuous mode [ 1026.755496][ T1647] BPF:[1] FUNC_PROTO (anon) [ 1026.755516][ T1647] BPF:return=0 args=( [ 1026.755527][ T1647] BPF:116 [ 1026.755536][ T1647] BPF:, vararg [ 1026.755545][ T1647] BPF:) [ 1026.755554][ T1647] BPF: [ 1026.755563][ T1647] BPF:Invalid arg#1 [ 1026.755572][ T1647] BPF: [ 1026.755572][ T1647] 01:11:45 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x6000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:45 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x7, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:45 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x7a}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x74, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x1f00000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:11:45 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000000)={0xea, 0x1, 0x8}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r4}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000140)) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1026.758837][ T1647] BPF:[1] FUNC_PROTO (anon) [ 1026.758854][ T1647] BPF:return=0 args=( [ 1026.758867][ T1647] BPF:116 [ 1026.758876][ T1647] BPF:, vararg [ 1026.758886][ T1647] BPF:) [ 1026.758895][ T1647] BPF: [ 1026.758904][ T1647] BPF:Invalid arg#1 [ 1026.758914][ T1647] BPF: [ 1026.758914][ T1647] [ 1027.672637][ T1680] BPF:[1] FUNC_PROTO (anon) [ 1027.677477][ T1680] BPF:return=0 args=( [ 1027.683575][ T1680] BPF:0 (anon) [ 1027.685281][ T1685] BPF:[1] FUNC_PROTO (anon) [ 1027.686963][ T1680] BPF:, 2 (invalid-name-offset) [ 1027.686977][ T1680] BPF:) [ 1027.686986][ T1680] BPF: [ 1027.686996][ T1680] BPF:Invalid arg#1 [ 1027.692653][ T1685] BPF:return=100663296 args=( [ 1027.696464][ T1680] BPF: [ 1027.696464][ T1680] [ 1027.699223][ T1685] BPF:0 (anon) [ 1027.721497][ T1685] BPF:, 0 [ 1027.724521][ T1685] BPF:, vararg [ 1027.726392][ T1690] device vlan1237 entered promiscuous mode [ 1027.727888][ T1685] BPF:) [ 1027.727899][ T1685] BPF: [ 1027.739323][ T1685] BPF:Invalid return type [ 1027.743713][ T1685] BPF: [ 1027.743713][ T1685] [ 1027.749463][ T1684] BPF:[1] FUNC_PROTO (anon) [ 1027.756164][ T1684] BPF:return=0 args=( [ 1027.761330][ T1684] BPF:0 (anon) [ 1027.764751][ T1684] BPF:, 2 (invalid-name-offset) [ 1027.769695][ T1684] BPF:) [ 1027.773575][ T1684] BPF: [ 1027.776350][ T1684] BPF:Invalid arg#1 [ 1027.779484][ T1689] BPF:[1] FUNC_PROTO (anon) [ 1027.780231][ T1684] BPF: [ 1027.780231][ T1684] [ 1027.784841][ T1689] BPF:return=100663296 args=( [ 1027.794341][ T1689] BPF:0 (anon) [ 1027.797719][ T1689] BPF:, 0 [ 1027.800784][ T1689] BPF:, vararg [ 1027.804163][ T1689] BPF:) [ 1027.806917][ T1689] BPF: [ 1027.809678][ T1689] BPF:Invalid return type [ 1027.814049][ T1689] BPF: [ 1027.814049][ T1689] [ 1027.843750][ T1696] BPF:[1] FUNC_PROTO (anon) [ 1027.848763][ T1696] BPF:return=0 args=( [ 1027.852828][ T1696] BPF:122 [ 1027.855855][ T1696] BPF:, vararg [ 1027.859230][ T1696] BPF:) [ 1027.862045][ T1696] BPF: [ 1027.864810][ T1696] BPF:Invalid arg#1 [ 1027.868615][ T1696] BPF: [ 1027.868615][ T1696] 01:11:45 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) r4 = syz_io_uring_complete(0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000000)={0x1, 0xfffffffd, 0x6, 0x0, 0x0}) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r4, 0xc01064b3, &(0x7f0000000140)={r5}) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000200)={&(0x7f00000001c0), 0x0, 0x200, 0x4, 0x8000, 0x2, 0x80000001, 0x1, {0x4, 0x6, 0x5, 0x80, 0x3, 0x1, 0x54f0, 0x1f, 0x2, 0xffff, 0xd5, 0x2, 0x9, 0x10000, "69050b15824059c92d75ad00440475de2809daa860b20448d06f683b46984417"}}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1027.890859][ T1699] BPF:[1] FUNC_PROTO (anon) [ 1027.895538][ T1699] BPF:return=0 args=( [ 1027.899525][ T1699] BPF:122 [ 1027.902614][ T1699] BPF:, vararg [ 1027.906048][ T1699] BPF:) [ 1027.908815][ T1699] BPF: [ 1027.911631][ T1699] BPF:Invalid arg#1 [ 1027.915439][ T1699] BPF: [ 1027.915439][ T1699] 01:11:45 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x9, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x7a, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:45 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0xd2}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:45 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0xfb3, 0x400) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) getpid() ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x8, 0x2, 0x400007}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:11:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x2000000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1028.213904][ T1733] BPF:[1] FUNC_PROTO (anon) [ 1028.218567][ T1733] BPF:return=0 args=( [ 1028.223856][ T1733] BPF:0 (anon) [ 1028.227248][ T1733] BPF:, 2 (invalid-name-offset) [ 1028.233173][ T1733] BPF:) [ 1028.235947][ T1733] BPF: [ 1028.238719][ T1733] BPF:Invalid arg#1 [ 1028.243833][ T1733] BPF: [ 1028.243833][ T1733] [ 1028.256305][ T1735] BPF:[1] FUNC_PROTO (anon) 01:11:45 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x7000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1028.263230][ T1735] BPF:return=0 args=( [ 1028.267411][ T1735] BPF:0 (anon) [ 1028.271865][ T1735] BPF:, 2 (invalid-name-offset) [ 1028.276729][ T1735] BPF:) [ 1028.279493][ T1735] BPF: [ 1028.283544][ T1735] BPF:Invalid arg#1 [ 1028.287359][ T1735] BPF: [ 1028.287359][ T1735] 01:11:45 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xa, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:45 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r4, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r4, 0xc01064b3, &(0x7f0000000000)={r1}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000300)={r5}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1028.365469][ T1744] device vlan1238 entered promiscuous mode [ 1028.617874][ T1772] BPF:[1] FUNC_PROTO (anon) [ 1028.624494][ T1772] BPF:return=117440512 args=( [ 1028.629189][ T1772] BPF:0 (anon) [ 1028.629219][ T1774] BPF:[1] FUNC_PROTO (anon) [ 1028.633872][ T1772] BPF:, 0 [ 1028.633885][ T1772] BPF:, vararg [ 1028.633894][ T1772] BPF:) [ 1028.633903][ T1772] BPF: [ 1028.633911][ T1772] BPF:Invalid return type [ 1028.633921][ T1772] BPF: [ 1028.633921][ T1772] [ 1028.663766][ T1774] BPF:return=0 args=( 01:11:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x84, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1028.667856][ T1774] BPF:0 (anon) [ 1028.672267][ T1774] BPF:, 2 (invalid-name-offset) [ 1028.677228][ T1774] BPF:) [ 1028.681369][ T1774] BPF: [ 1028.684144][ T1774] BPF:Invalid arg#1 [ 1028.687955][ T1774] BPF: [ 1028.687955][ T1774] [ 1028.698279][ T1775] BPF:[1] FUNC_PROTO (anon) [ 1028.704147][ T1775] BPF:return=0 args=( [ 1028.708142][ T1775] BPF:0 (anon) [ 1028.712493][ T1775] BPF:, 2 (invalid-name-offset) 01:11:46 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x8000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x2010000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1028.717531][ T1775] BPF:) [ 1028.721471][ T1775] BPF: [ 1028.724240][ T1775] BPF:Invalid arg#1 [ 1028.728413][ T1775] BPF: [ 1028.728413][ T1775] [ 1028.943951][ T1792] BPF:[1] FUNC_PROTO (anon) [ 1028.948644][ T1792] BPF:return=134217728 args=( [ 1028.954562][ T1792] BPF:0 (anon) [ 1028.957955][ T1792] BPF:, 0 [ 1028.962246][ T1792] BPF:, vararg [ 1028.965629][ T1792] BPF:) [ 1028.966429][ T1787] device vlan1239 entered promiscuous mode [ 1028.968408][ T1792] BPF: [ 1028.978164][ T1792] BPF:Invalid return type [ 1028.983732][ T1792] BPF: [ 1028.983732][ T1792] [ 1029.006560][ T1794] BPF:[1] FUNC_PROTO (anon) [ 1029.012523][ T1794] BPF:return=134217728 args=( [ 1029.017212][ T1794] BPF:0 (anon) [ 1029.021712][ T1794] BPF:, 0 [ 1029.024750][ T1794] BPF:, vararg [ 1029.028115][ T1794] BPF:) [ 1029.031938][ T1794] BPF: [ 1029.034717][ T1794] BPF:Invalid return type [ 1029.039047][ T1794] BPF: [ 1029.039047][ T1794] 01:11:46 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1d, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x9d, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:46 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xa000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1029.279986][ T1819] BPF:[1] FUNC_PROTO (anon) [ 1029.284649][ T1819] BPF:return=0 args=( [ 1029.288641][ T1819] BPF:0 (anon) [ 1029.294539][ T1819] BPF:, 2 (invalid-name-offset) [ 1029.299407][ T1819] BPF:) [ 1029.303264][ T1819] BPF: [ 1029.306046][ T1819] BPF:Invalid arg#1 [ 1029.311107][ T1819] BPF: [ 1029.311107][ T1819] [ 1029.349096][ T1821] BPF:[1] FUNC_PROTO (anon) [ 1029.355052][ T1821] BPF:return=0 args=( [ 1029.359050][ T1821] BPF:0 (anon) [ 1029.362502][ T1821] BPF:, 2 (invalid-name-offset) [ 1029.367367][ T1821] BPF:) [ 1029.370175][ T1821] BPF: [ 1029.372942][ T1821] BPF:Invalid arg#1 [ 1029.376749][ T1821] BPF: [ 1029.376749][ T1821] [ 1029.447748][ T1824] device vlan1240 entered promiscuous mode [ 1029.527873][ T1831] BPF:[1] FUNC_PROTO (anon) [ 1029.533719][ T1831] BPF:return=167772160 args=( [ 1029.538414][ T1831] BPF:0 (anon) [ 1029.543063][ T1831] BPF:, 0 [ 1029.546311][ T1831] BPF:, vararg [ 1029.551140][ T1831] BPF:) [ 1029.553914][ T1831] BPF: [ 1029.556713][ T1831] BPF:Invalid return type [ 1029.561101][ T1831] BPF: [ 1029.561101][ T1831] [ 1029.587355][ T1833] BPF:[1] FUNC_PROTO (anon) [ 1029.593430][ T1833] BPF:return=167772160 args=( [ 1029.598189][ T1833] BPF:0 (anon) [ 1029.601654][ T1833] BPF:, 0 [ 1029.604684][ T1833] BPF:, vararg [ 1029.608058][ T1833] BPF:) [ 1029.610905][ T1833] BPF: [ 1029.613674][ T1833] BPF:Invalid return type [ 1029.618002][ T1833] BPF: [ 1029.618002][ T1833] [ 1030.455969][ T1844] BPF:[1] FUNC_PROTO (anon) [ 1030.462011][ T1844] BPF:return=0 args=( [ 1030.466359][ T1844] BPF:210 [ 1030.469396][ T1844] BPF:, vararg [ 1030.474105][ T1844] BPF:) [ 1030.476889][ T1844] BPF: [ 1030.479738][ T1844] BPF:Invalid arg#1 [ 1030.483548][ T1844] BPF: [ 1030.483548][ T1844] 01:11:48 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x300}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x32bc33f100000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:11:48 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x24, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:48 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x11000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0xa3, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1030.505453][ T1845] BPF:[1] FUNC_PROTO (anon) [ 1030.511153][ T1845] BPF:return=0 args=( [ 1030.515154][ T1845] BPF:210 [ 1030.518189][ T1845] BPF:, vararg [ 1030.523138][ T1845] BPF:) [ 1030.525908][ T1845] BPF: [ 1030.528670][ T1845] BPF:Invalid arg#1 [ 1030.533644][ T1845] BPF: [ 1030.533644][ T1845] [ 1030.696325][ T1853] BPF:[1] FUNC_PROTO (anon) [ 1030.701860][ T1853] BPF:return=285212672 args=( [ 1030.706597][ T1853] BPF:0 (anon) [ 1030.711330][ T1853] BPF:, 0 [ 1030.714370][ T1853] BPF:, vararg [ 1030.717749][ T1853] BPF:) [ 1030.721862][ T1853] BPF: [ 1030.724682][ T1853] BPF:Invalid return type [ 1030.729022][ T1853] BPF: [ 1030.729022][ T1853] [ 1030.776109][ T1856] BPF:[1] FUNC_PROTO (anon) [ 1030.781753][ T1856] BPF:return=0 args=( [ 1030.785757][ T1856] BPF:0 (anon) [ 1030.789137][ T1856] BPF:, 2 (invalid-name-offset) [ 1030.795321][ T1856] BPF:) [ 1030.798624][ T1856] BPF: [ 1030.801479][ T1856] BPF:Invalid arg#1 [ 1030.805294][ T1856] BPF: [ 1030.805294][ T1856] [ 1030.827298][ T1858] BPF:[1] FUNC_PROTO (anon) [ 1030.832946][ T1858] BPF:return=0 args=( [ 1030.836942][ T1858] BPF:0 (anon) [ 1030.841617][ T1858] BPF:, 2 (invalid-name-offset) [ 1030.846477][ T1858] BPF:) [ 1030.849239][ T1858] BPF: [ 1030.853157][ T1858] BPF:Invalid arg#1 [ 1030.856979][ T1858] BPF: [ 1030.856979][ T1858] [ 1030.924558][ T1863] device vlan1241 entered promiscuous mode 01:11:48 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x25, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:48 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x1f000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x3f00000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:11:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0xed, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1031.164977][ T1884] BPF:[1] FUNC_PROTO (anon) [ 1031.170781][ T1884] BPF:return=0 args=( [ 1031.174778][ T1884] BPF:0 (anon) [ 1031.178154][ T1884] BPF:, 2 (invalid-name-offset) [ 1031.184897][ T1884] BPF:) [ 1031.187682][ T1884] BPF: [ 1031.192265][ T1884] BPF:Invalid arg#1 [ 1031.196088][ T1884] BPF: [ 1031.196088][ T1884] [ 1031.209188][ T1885] BPF:[1] FUNC_PROTO (anon) [ 1031.215160][ T1885] BPF:return=0 args=( [ 1031.219160][ T1885] BPF:0 (anon) [ 1031.222650][ T1885] BPF:, 2 (invalid-name-offset) [ 1031.227503][ T1885] BPF:) [ 1031.230382][ T1885] BPF: [ 1031.233155][ T1885] BPF:Invalid arg#1 [ 1031.236958][ T1885] BPF: [ 1031.236958][ T1885] [ 1031.300977][ T1889] BPF:[1] FUNC_PROTO (anon) [ 1031.305635][ T1889] BPF:return=520093696 args=( [ 1031.312752][ T1889] BPF:0 (anon) [ 1031.316144][ T1889] BPF:, 0 [ 1031.319175][ T1889] BPF:, vararg [ 1031.323991][ T1889] BPF:) [ 1031.326765][ T1889] BPF: [ 1031.330638][ T1889] BPF:Invalid return type [ 1031.334970][ T1889] BPF: [ 1031.334970][ T1889] 01:11:48 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x29, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1031.383798][ T1890] BPF:[1] FUNC_PROTO (anon) [ 1031.388619][ T1890] BPF:return=520093696 args=( [ 1031.394552][ T1890] BPF:0 (anon) [ 1031.397941][ T1890] BPF:, 0 [ 1031.400999][ T1890] BPF:, vararg [ 1031.404368][ T1890] BPF:) [ 1031.407126][ T1890] BPF: [ 1031.409918][ T1890] BPF:Invalid return type [ 1031.414249][ T1890] BPF: [ 1031.414249][ T1890] 01:11:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x4800000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1031.512959][ T1902] device vlan1242 entered promiscuous mode 01:11:49 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x20000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1031.639252][ T1912] BPF:[1] FUNC_PROTO (anon) [ 1031.645394][ T1912] BPF:return=0 args=( [ 1031.649432][ T1912] BPF:0 (anon) [ 1031.654118][ T1912] BPF:, 2 (invalid-name-offset) [ 1031.658968][ T1912] BPF:) [ 1031.662917][ T1912] BPF: [ 1031.665693][ T1912] BPF:Invalid arg#1 [ 1031.670806][ T1912] BPF: [ 1031.670806][ T1912] [ 1031.693022][ T1913] BPF:[1] FUNC_PROTO (anon) [ 1031.697850][ T1913] BPF:return=0 args=( [ 1031.703300][ T1913] BPF:0 (anon) [ 1031.706689][ T1913] BPF:, 2 (invalid-name-offset) [ 1031.711612][ T1913] BPF:) [ 1031.714375][ T1913] BPF: [ 1031.717139][ T1913] BPF:Invalid arg#1 [ 1031.721016][ T1913] BPF: [ 1031.721016][ T1913] [ 1031.824487][ T1922] BPF:[1] FUNC_PROTO (anon) [ 1031.829163][ T1922] BPF:return=536870912 args=( [ 1031.835100][ T1922] BPF:0 (anon) [ 1031.838486][ T1922] BPF:, 0 [ 1031.842576][ T1922] BPF:, vararg [ 1031.845948][ T1922] BPF:) [ 1031.848708][ T1922] BPF: [ 1031.852479][ T1922] BPF:Invalid return type [ 1031.856812][ T1922] BPF: [ 1031.856812][ T1922] [ 1031.877603][ T1923] BPF:[1] FUNC_PROTO (anon) [ 1031.883744][ T1923] BPF:return=536870912 args=( [ 1031.888561][ T1923] BPF:0 (anon) [ 1031.892844][ T1923] BPF:, 0 [ 1031.895880][ T1923] BPF:, vararg [ 1031.899655][ T1923] BPF:) [ 1031.902423][ T1923] BPF: [ 1031.905181][ T1923] BPF:Invalid return type [ 1031.911952][ T1923] BPF: [ 1031.911952][ T1923] [ 1032.331811][ T1940] BPF:[1] FUNC_PROTO (anon) [ 1032.336482][ T1940] BPF:return=0 args=( [ 1032.342990][ T1940] BPF:768 [ 1032.346036][ T1940] BPF:, vararg [ 1032.350521][ T1940] BPF:) [ 1032.353296][ T1940] BPF: [ 1032.356062][ T1940] BPF:Invalid arg#1 [ 1032.361103][ T1940] BPF: [ 1032.361103][ T1940] [ 1032.385863][ T1942] BPF:[1] FUNC_PROTO (anon) [ 1032.391591][ T1942] BPF:return=0 args=( [ 1032.395583][ T1942] BPF:768 [ 1032.398616][ T1942] BPF:, vararg [ 1032.403127][ T1942] BPF:) [ 1032.405891][ T1942] BPF: [ 1032.408654][ T1942] BPF:Invalid arg#1 [ 1032.414116][ T1942] BPF: [ 1032.414116][ T1942] 01:11:50 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x500}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:50 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x2b, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:50 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x24000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x4c00000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1032.715261][ T1951] BPF:[1] FUNC_PROTO (anon) [ 1032.721232][ T1951] BPF:return=0 args=( [ 1032.725232][ T1951] BPF:0 (anon) [ 1032.728613][ T1951] BPF:, 2 (invalid-name-offset) [ 1032.734708][ T1951] BPF:) [ 1032.737492][ T1951] BPF: [ 1032.740322][ T1951] BPF:Invalid arg#1 [ 1032.744129][ T1951] BPF: [ 1032.744129][ T1951] [ 1032.757122][ T1956] BPF:[1] FUNC_PROTO (anon) [ 1032.762969][ T1956] BPF:return=0 args=( [ 1032.767009][ T1956] BPF:1280 [ 1032.771314][ T1956] BPF:, vararg [ 1032.774544][ T1955] BPF:[1] FUNC_PROTO (anon) [ 1032.774690][ T1956] BPF:) [ 1032.774701][ T1956] BPF: [ 1032.779295][ T1955] BPF:return=0 args=( [ 1032.782943][ T1956] BPF:Invalid arg#1 [ 1032.784837][ T1955] BPF:0 (anon) [ 1032.788800][ T1956] BPF: [ 1032.788800][ T1956] [ 1032.794869][ T1955] BPF:, 2 (invalid-name-offset) [ 1032.807989][ T1955] BPF:) [ 1032.811913][ T1955] BPF: [ 1032.814681][ T1955] BPF:Invalid arg#1 [ 1032.818480][ T1955] BPF: [ 1032.818480][ T1955] [ 1032.829284][ T1958] BPF:[1] FUNC_PROTO (anon) [ 1032.834962][ T1958] BPF:return=0 args=( [ 1032.838945][ T1958] BPF:1280 [ 1032.843306][ T1958] BPF:, vararg [ 1032.846690][ T1958] BPF:) [ 1032.850423][ T1958] BPF: [ 1032.853189][ T1958] BPF:Invalid arg#1 [ 1032.853939][ T1969] BPF:[1] FUNC_PROTO (anon) [ 1032.856989][ T1958] BPF: [ 1032.856989][ T1958] [ 1032.867794][ T1969] BPF:return=603979776 args=( [ 1032.871969][ T1967] device vlan1243 entered promiscuous mode [ 1032.872522][ T1969] BPF:0 (anon) [ 1032.881685][ T1969] BPF:, 0 [ 1032.884806][ T1969] BPF:, vararg [ 1032.888185][ T1969] BPF:) [ 1032.890992][ T1969] BPF: [ 1032.893754][ T1969] BPF:Invalid return type [ 1032.898137][ T1969] BPF: [ 1032.898137][ T1969] [ 1032.937742][ T1970] BPF:[1] FUNC_PROTO (anon) [ 1032.943560][ T1970] BPF:return=603979776 args=( [ 1032.948250][ T1970] BPF:0 (anon) [ 1032.952792][ T1970] BPF:, 0 [ 1032.955820][ T1970] BPF:, vararg [ 1032.959186][ T1970] BPF:) [ 1032.963069][ T1970] BPF: [ 1032.965836][ T1970] BPF:Invalid return type [ 1032.971120][ T1970] BPF: [ 1032.971120][ T1970] 01:11:50 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x32, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x2, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x6000000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:11:50 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x600}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1033.284820][ T1990] BPF:[1] FUNC_PROTO (anon) [ 1033.291965][ T1990] BPF:return=0 args=( [ 1033.295966][ T1990] BPF:0 (anon) [ 1033.300605][ T1990] BPF:, 2 (invalid-name-offset) [ 1033.306858][ T1990] BPF:) [ 1033.310713][ T1990] BPF: [ 1033.313503][ T1990] BPF:Invalid arg#1 [ 1033.317331][ T1990] BPF: [ 1033.317331][ T1990] 01:11:50 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x26000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1033.334749][ T1991] BPF:[1] FUNC_PROTO (anon) [ 1033.341493][ T1991] BPF:return=0 args=( [ 1033.345496][ T1991] BPF:0 (anon) [ 1033.348877][ T1991] BPF:, 2 (invalid-name-offset) [ 1033.355220][ T1991] BPF:) [ 1033.358000][ T1991] BPF: [ 1033.362045][ T1991] BPF:Invalid arg#1 [ 1033.365891][ T1991] BPF: [ 1033.365891][ T1991] 01:11:50 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x34, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1033.448110][ T1998] device vlan1244 entered promiscuous mode [ 1033.513436][ T2005] BPF:[1] FUNC_PROTO (anon) [ 1033.518117][ T2005] BPF:return=0 args=( [ 1033.523763][ T2005] BPF:1536 [ 1033.526890][ T2005] BPF:, vararg [ 1033.530324][ T2005] BPF:) [ 1033.533090][ T2005] BPF: [ 1033.535857][ T2005] BPF:Invalid arg#1 [ 1033.539714][ T2005] BPF: [ 1033.539714][ T2005] [ 1033.563094][ T2007] BPF:[1] FUNC_PROTO (anon) [ 1033.567751][ T2007] BPF:return=0 args=( [ 1033.574042][ T2007] BPF:1536 [ 1033.577168][ T2007] BPF:, vararg [ 1033.580594][ T2007] BPF:) [ 1033.583359][ T2007] BPF: [ 1033.586141][ T2007] BPF:Invalid arg#1 [ 1033.590004][ T2007] BPF: [ 1033.590004][ T2007] [ 1033.597949][ T2009] BPF:[1] FUNC_PROTO (anon) [ 1033.603607][ T2009] BPF:return=637534208 args=( [ 1033.608301][ T2009] BPF:0 (anon) [ 1033.612825][ T2009] BPF:, 0 [ 1033.615859][ T2009] BPF:, vararg [ 1033.619237][ T2009] BPF:) [ 1033.623228][ T2009] BPF: [ 1033.625993][ T2009] BPF:Invalid return type [ 1033.631507][ T2009] BPF: [ 1033.631507][ T2009] [ 1033.655330][ T2010] BPF:[1] FUNC_PROTO (anon) [ 1033.661355][ T2010] BPF:return=637534208 args=( [ 1033.666076][ T2010] BPF:0 (anon) [ 1033.670719][ T2010] BPF:, 0 [ 1033.673753][ T2010] BPF:, vararg [ 1033.677128][ T2010] BPF:) [ 1033.681158][ T2010] BPF: [ 1033.683929][ T2010] BPF:Invalid return type [ 1033.688253][ T2010] BPF: [ 1033.688253][ T2010] [ 1033.734913][ T2018] BPF:[1] FUNC_PROTO (anon) [ 1033.740589][ T2018] BPF:return=0 args=( [ 1033.744949][ T2018] BPF:0 (anon) [ 1033.748340][ T2018] BPF:, 2 (invalid-name-offset) [ 1033.754363][ T2018] BPF:) [ 1033.757141][ T2018] BPF: [ 1033.759974][ T2018] BPF:Invalid arg#1 [ 1033.763784][ T2018] BPF: [ 1033.763784][ T2018] 01:11:51 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x700}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x3, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1033.782111][ T2020] BPF:[1] FUNC_PROTO (anon) [ 1033.786727][ T2020] BPF:return=0 args=( [ 1033.791888][ T2020] BPF:0 (anon) [ 1033.795280][ T2020] BPF:, 2 (invalid-name-offset) [ 1033.801314][ T2020] BPF:) [ 1033.804102][ T2020] BPF: [ 1033.806868][ T2020] BPF:Invalid arg#1 [ 1033.811631][ T2020] BPF: [ 1033.811631][ T2020] 01:11:51 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x63, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:51 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x48000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1033.968421][ T2025] BPF:[1] FUNC_PROTO (anon) [ 1033.974389][ T2025] BPF:return=0 args=( [ 1033.978392][ T2025] BPF:1792 [ 1033.982376][ T2025] BPF:, vararg [ 1033.985761][ T2025] BPF:) [ 1033.988523][ T2025] BPF: [ 1033.992501][ T2025] BPF:Invalid arg#1 [ 1033.996324][ T2025] BPF: [ 1033.996324][ T2025] [ 1034.007677][ T2024] device vlan1245 entered promiscuous mode [ 1034.028589][ T2026] BPF:[1] FUNC_PROTO (anon) [ 1034.034505][ T2026] BPF:return=0 args=( [ 1034.038507][ T2026] BPF:1792 [ 1034.042956][ T2026] BPF:, vararg [ 1034.046336][ T2026] BPF:) [ 1034.049331][ T2026] BPF: [ 1034.052135][ T2026] BPF:Invalid arg#1 [ 1034.055939][ T2026] BPF: [ 1034.055939][ T2026] [ 1034.176809][ T2041] BPF:[1] FUNC_PROTO (anon) [ 1034.182945][ T2041] BPF:return=1207959552 args=( [ 1034.187730][ T2041] BPF:0 (anon) [ 1034.191197][ T2041] BPF:, 0 [ 1034.194228][ T2041] BPF:, vararg [ 1034.197601][ T2041] BPF:) [ 1034.200430][ T2041] BPF: [ 1034.203191][ T2041] BPF:Invalid return type [ 1034.207517][ T2041] BPF: [ 1034.207517][ T2041] 01:11:51 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0xa00}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x4, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1034.226076][ T2043] BPF:[1] FUNC_PROTO (anon) [ 1034.232031][ T2043] BPF:return=1207959552 args=( [ 1034.236804][ T2043] BPF:0 (anon) [ 1034.241348][ T2043] BPF:, 0 [ 1034.244390][ T2043] BPF:, vararg [ 1034.247756][ T2043] BPF:) [ 1034.254259][ T2043] BPF: [ 1034.257028][ T2043] BPF:Invalid return type [ 1034.261447][ T2043] BPF: [ 1034.261447][ T2043] [ 1034.283161][ T2050] BPF:[1] FUNC_PROTO (anon) [ 1034.287815][ T2050] BPF:return=0 args=( [ 1034.293233][ T2050] BPF:0 (anon) [ 1034.296635][ T2050] BPF:, 2 (invalid-name-offset) [ 1034.302452][ T2050] BPF:) [ 1034.305226][ T2050] BPF: [ 1034.307990][ T2050] BPF:Invalid arg#1 [ 1034.312875][ T2050] BPF: [ 1034.312875][ T2050] 01:11:51 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x3f2, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:51 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x4c000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1034.544984][ T2055] device vlan1246 entered promiscuous mode [ 1034.613007][ T2069] BPF:[1] FUNC_PROTO (anon) [ 1034.617675][ T2069] BPF:return=1275068416 args=( [ 1034.621776][ T2072] BPF:[1] FUNC_PROTO (anon) [ 1034.623711][ T2069] BPF:0 (anon) [ 1034.627105][ T2072] BPF:return=0 args=( [ 1034.631523][ T2069] BPF:, 0 [ 1034.631536][ T2069] BPF:, vararg [ 1034.631545][ T2069] BPF:) [ 1034.631555][ T2069] BPF: [ 1034.631564][ T2069] BPF:Invalid return type [ 1034.631580][ T2069] BPF: [ 1034.631580][ T2069] [ 1034.645663][ T2071] BPF:[1] FUNC_PROTO (anon) [ 1034.647161][ T2072] BPF:0 (anon) [ 1034.647175][ T2072] BPF:, 2 (invalid-name-offset) [ 1034.647186][ T2072] BPF:) [ 1034.647195][ T2072] BPF: [ 1034.650968][ T2071] BPF:return=1275068416 args=( [ 1034.654303][ T2072] BPF:Invalid arg#1 [ 1034.659136][ T2071] BPF:0 (anon) [ 1034.660180][ T2071] BPF:, 0 [ 1034.660190][ T2071] BPF:, vararg [ 1034.660199][ T2071] BPF:) [ 1034.660208][ T2071] BPF: [ 1034.660216][ T2071] BPF:Invalid return type [ 1034.660225][ T2071] BPF: [ 1034.660225][ T2071] [ 1034.714400][ T2072] BPF: [ 1034.714400][ T2072] [ 1034.744599][ T2073] BPF:[1] FUNC_PROTO (anon) [ 1034.750305][ T2073] BPF:return=0 args=( [ 1034.754304][ T2073] BPF:0 (anon) [ 1034.757681][ T2073] BPF:, 2 (invalid-name-offset) [ 1034.763743][ T2073] BPF:) [ 1034.766705][ T2073] BPF: [ 1034.770845][ T2073] BPF:Invalid arg#1 [ 1034.774662][ T2073] BPF: [ 1034.774662][ T2073] 01:11:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x6800000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:11:53 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x1c00}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:53 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x60000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x5, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:53 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x3fd, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1035.877033][ T2110] BPF:[1] FUNC_PROTO (anon) [ 1035.882840][ T2110] BPF:return=0 args=( [ 1035.886849][ T2110] BPF:0 (anon) [ 1035.891553][ T2110] BPF:, 2 (invalid-name-offset) [ 1035.896664][ T2110] BPF:) [ 1035.900759][ T2110] BPF: [ 1035.903538][ T2110] BPF:Invalid arg#1 [ 1035.907347][ T2110] BPF: [ 1035.907347][ T2110] [ 1035.933589][ T2115] BPF:[1] FUNC_PROTO (anon) [ 1035.938259][ T2115] BPF:return=0 args=( [ 1035.942772][ T2107] device vlan1247 entered promiscuous mode [ 1035.951107][ T2115] BPF:0 (anon) [ 1035.954509][ T2115] BPF:, 2 (invalid-name-offset) [ 1035.960627][ T2115] BPF:) [ 1035.963398][ T2115] BPF: [ 1035.966162][ T2115] BPF:Invalid arg#1 [ 1035.971073][ T2115] BPF: [ 1035.971073][ T2115] [ 1035.978327][ T2119] BPF:[1] FUNC_PROTO (anon) [ 1035.984402][ T2119] BPF:return=1610612736 args=( [ 1035.990583][ T2119] BPF:0 (anon) [ 1035.994058][ T2119] BPF:, 0 [ 1035.997298][ T2119] BPF:, vararg [ 1036.001883][ T2119] BPF:) [ 1036.004659][ T2119] BPF: [ 1036.007436][ T2119] BPF:Invalid return type [ 1036.011830][ T2119] BPF: [ 1036.011830][ T2119] [ 1036.026742][ T2130] BPF:[1] FUNC_PROTO (anon) [ 1036.032885][ T2130] BPF:return=1610612736 args=( [ 1036.037667][ T2130] BPF:0 (anon) [ 1036.043087][ T2130] BPF:, 0 [ 1036.046130][ T2130] BPF:, vararg [ 1036.049567][ T2130] BPF:) [ 1036.052334][ T2130] BPF: [ 1036.055106][ T2130] BPF:Invalid return type [ 1036.059508][ T2130] BPF: [ 1036.059508][ T2130] 01:11:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x6, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:53 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x68000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:53 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x3fe, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x6c00000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1036.385438][ T2160] device vlan1248 entered promiscuous mode [ 1036.396537][ T2161] BPF:[1] FUNC_PROTO (anon) [ 1036.402250][ T2161] BPF:return=1744830464 args=( [ 1036.407265][ T2161] BPF:0 (anon) [ 1036.412076][ T2161] BPF:, 0 [ 1036.415110][ T2161] BPF:, vararg [ 1036.418485][ T2161] BPF:) [ 1036.421320][ T2161] BPF: [ 1036.424093][ T2161] BPF:Invalid return type [ 1036.428425][ T2161] BPF: [ 1036.428425][ T2161] [ 1036.454904][ T2167] BPF:[1] FUNC_PROTO (anon) [ 1036.460808][ T2167] BPF:return=1744830464 args=( [ 1036.465616][ T2167] BPF:0 (anon) [ 1036.470251][ T2167] BPF:, 0 [ 1036.473282][ T2167] BPF:, vararg [ 1036.476654][ T2167] BPF:) [ 1036.476827][ T2170] BPF:[1] FUNC_PROTO (anon) [ 1036.479484][ T2167] BPF: [ 1036.479494][ T2167] BPF:Invalid return type [ 1036.479503][ T2167] BPF: [ 1036.479503][ T2167] [ 1036.498050][ T2170] BPF:return=0 args=( [ 1036.503122][ T2170] BPF:0 (anon) [ 1036.506838][ T2170] BPF:, 2 (invalid-name-offset) [ 1036.513077][ T2170] BPF:) [ 1036.516027][ T2170] BPF: [ 1036.518790][ T2170] BPF:Invalid arg#1 [ 1036.522672][ T2170] BPF: [ 1036.522672][ T2170] [ 1036.541968][ T2171] BPF:[1] FUNC_PROTO (anon) [ 1036.546646][ T2171] BPF:return=0 args=( [ 1036.552035][ T2171] BPF:0 (anon) [ 1036.555429][ T2171] BPF:, 2 (invalid-name-offset) [ 1036.560404][ T2171] BPF:) [ 1036.563181][ T2171] BPF: [ 1036.565951][ T2171] BPF:Invalid arg#1 [ 1036.569836][ T2171] BPF: [ 1036.569836][ T2171] 01:11:54 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000380), 0x4000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000003c0)={0x0, 0x0, r1}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x80000) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f00000004c0), 0xfffffffffffffff7, 0x20101) r4 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$FS_IOC_GETVERSION(r4, 0x80087601, &(0x7f0000000400)) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7}) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140), 0x2000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f0000000340)={r6, 0x7, &(0x7f0000000200)=[0x0, 0x6, 0x9, 0x4, 0x1, 0x6000, 0x9a39], &(0x7f0000000240)=[0x2, 0x3], 0x4, 0x4, 0x9, &(0x7f0000000280)=[0x9, 0x5, 0x8, 0x2], &(0x7f00000002c0)=[0x8]}) close(r2) openat$cgroup_ro(r5, &(0x7f0000000440)='cgroup.events\x00', 0x0, 0x0) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r7, 0xc00464b4, &(0x7f0000000300)) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:11:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x7, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:54 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x6c000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x7400000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1036.922988][ T2192] device vlan1249 entered promiscuous mode [ 1036.925991][ T2203] BPF:[1] FUNC_PROTO (anon) [ 1036.934551][ T2203] BPF:return=1811939328 args=( [ 1036.939384][ T2203] BPF:0 (anon) [ 1036.942774][ T2203] BPF:, 0 [ 1036.945801][ T2203] BPF:, vararg [ 1036.949225][ T2203] BPF:) [ 1036.951995][ T2203] BPF: [ 1036.954763][ T2203] BPF:Invalid return type [ 1036.959150][ T2203] BPF: [ 1036.959150][ T2203] [ 1036.977696][ T2208] BPF:[1] FUNC_PROTO (anon) [ 1036.983598][ T2208] BPF:return=1811939328 args=( [ 1036.988385][ T2208] BPF:0 (anon) [ 1036.993113][ T2208] BPF:, 0 [ 1036.996154][ T2208] BPF:, vararg [ 1037.000895][ T2208] BPF:) [ 1037.003709][ T2208] BPF: [ 1037.006471][ T2208] BPF:Invalid return type [ 1037.012242][ T2208] BPF: [ 1037.012242][ T2208] [ 1037.190405][ T2224] BPF:[1] FUNC_PROTO (anon) [ 1037.195039][ T2224] BPF:return=0 args=( [ 1037.199120][ T2224] BPF:7168 [ 1037.202248][ T2224] BPF:, vararg [ 1037.205623][ T2224] BPF:) [ 1037.208384][ T2224] BPF: [ 1037.211238][ T2224] BPF:Invalid arg#1 [ 1037.215051][ T2224] BPF: [ 1037.215051][ T2224] [ 1037.250146][ T2225] BPF:[1] FUNC_PROTO (anon) [ 1037.254766][ T2225] BPF:return=0 args=( [ 1037.258755][ T2225] BPF:7168 [ 1037.262978][ T2225] BPF:, vararg [ 1037.266362][ T2225] BPF:) [ 1037.270234][ T2225] BPF: [ 1037.273007][ T2225] BPF:Invalid arg#1 [ 1037.276813][ T2225] BPF: [ 1037.276813][ T2225] 01:11:54 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x1e00}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:54 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xffffff, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:54 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r3, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f0000000000)={r2}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:11:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x8, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:54 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x74000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x7a00000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1037.416629][ T2242] BPF:[1] FUNC_PROTO (anon) [ 1037.424028][ T2242] BPF:return=0 args=( [ 1037.428259][ T2242] BPF:0 (anon) [ 1037.432916][ T2242] BPF:, 2 (invalid-name-offset) [ 1037.437810][ T2242] BPF:) [ 1037.440618][ T2242] BPF: [ 1037.443388][ T2242] BPF:Invalid arg#1 [ 1037.447231][ T2242] BPF: [ 1037.447231][ T2242] 01:11:55 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0xffffffffffffffff, 0x24400) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001580), 0x8) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f00000015c0)={0x2, 0x2}) [ 1037.471674][ T2249] BPF:[1] FUNC_PROTO (anon) [ 1037.476346][ T2249] BPF:return=0 args=( [ 1037.481967][ T2249] BPF:0 (anon) [ 1037.485360][ T2249] BPF:, 2 (invalid-name-offset) [ 1037.490246][ T2249] BPF:) [ 1037.493017][ T2249] BPF: [ 1037.495787][ T2249] BPF:Invalid arg#1 [ 1037.499633][ T2249] BPF: [ 1037.499633][ T2249] [ 1037.562078][ T2252] device vlan1250 entered promiscuous mode 01:11:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x8800000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:11:55 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x7ffffff2, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1037.656723][ T2274] BPF:[1] FUNC_PROTO (anon) [ 1037.662650][ T2274] BPF:return=0 args=( [ 1037.666656][ T2274] BPF:7680 [ 1037.670845][ T2274] BPF:, vararg [ 1037.674233][ T2274] BPF:) [ 1037.677000][ T2274] BPF: [ 1037.681100][ T2274] BPF:Invalid arg#1 [ 1037.684913][ T2274] BPF: [ 1037.684913][ T2274] 01:11:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x9, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1037.727645][ T2275] BPF:[1] FUNC_PROTO (anon) [ 1037.733584][ T2275] BPF:return=0 args=( [ 1037.737801][ T2275] BPF:7680 [ 1037.741767][ T2275] BPF:, vararg [ 1037.745159][ T2275] BPF:) [ 1037.747926][ T2275] BPF: [ 1037.750730][ T2275] BPF:Invalid arg#1 [ 1037.754540][ T2275] BPF: [ 1037.754540][ T2275] 01:11:55 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x1f00}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:55 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) clone(0x1000, &(0x7f0000000000)="aac38510d2a1de297e581a78b4d681a887068250335a7869478931125b36f5d1e1074306", &(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)="a11404532c66712a41110ddbcc3a66f4bcee1efdf4417794ae6dcaadfe9380b4b477901cc23c9d8adbd0aaf5b3fe1b064b661f93e3ed138b70d052962d78ceec507f9c25700e402168c812f4621c46531b4bcb41b4c3c391f0edcfd700959cbddb89d361dc2afd4dedd13eac85fe6c08cdf9aa5ed7232a3d4b06d92500fe9e6a769e8e01cf65a0914652e5a27d9053ebd4ae17b4d49935e05df45c76e0e51a83b30fa685d8e3b16a0cd28b8dc6b8ab097955ebe38aa6cfc43b88d4a77ccfbb75e4a2bed600d2553d6fd28aaf8cd7c9f2dc13838eafb20025c469666b086ab0965110f2fe87") clone(0x22002100, &(0x7f0000000340)="cac37028150bad9bf5ab68709f2877ef91c39c9d3c6295d27fca2903e07643fc19a702d6c59bafddc5626b0f10b757447aa09bbf7b952320495f040b57a8b032213829239725b0bd98c40fda2130610a2944d5f1f031ab67a3dd1b07af8929c66e16", &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="c6daa2261dd11fd4d43f5145554acd3bc4bb3400e043a043d8643d0d79d57448046d1d5875cd2b1f0d5843ef3e70c7c2c114de1c6a11bee7f4613ef86297899dd1d7cd3078bfbffacf7ce80a3bbe32a302005031a4f70ed394ca90fa85ab8cce58f9bcadf2b8b9f2e90cd43e90ee8bbe7261f09f7628a90799e8c6b2157aea244bbd92adb3b04f1b645a8d2d4ac5b7839e1c566df3927f00bb2607ef8486178cdf") ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) syz_open_dev$dri(&(0x7f0000000600), 0x81, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000500)={0x7, 0x7fff, 0x3ff, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000540)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x801) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r5}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1037.897758][ T2299] BPF:[1] FUNC_PROTO (anon) [ 1037.903447][ T2299] BPF:return=0 args=( [ 1037.907454][ T2299] BPF:0 (anon) [ 1037.912037][ T2299] BPF:, 2 (invalid-name-offset) [ 1037.916905][ T2299] BPF:) [ 1037.920798][ T2299] BPF: [ 1037.923580][ T2299] BPF:Invalid arg#1 [ 1037.927391][ T2299] BPF: [ 1037.927391][ T2299] [ 1037.953029][ T2304] BPF:[1] FUNC_PROTO (anon) [ 1037.957688][ T2304] BPF:return=0 args=( [ 1037.964127][ T2304] BPF:0 (anon) [ 1037.967525][ T2304] BPF:, 2 (invalid-name-offset) [ 1037.973542][ T2304] BPF:) [ 1037.976319][ T2304] BPF: [ 1037.980316][ T2304] BPF:Invalid arg#1 [ 1037.984130][ T2304] BPF: [ 1037.984130][ T2304] [ 1038.026484][ T2323] device vlan1251 entered promiscuous mode [ 1038.085872][ T2337] BPF:[1] FUNC_PROTO (anon) [ 1038.092906][ T2337] BPF:return=0 args=( [ 1038.096910][ T2337] BPF:7936 [ 1038.096984][ T2338] BPF:[1] FUNC_PROTO (anon) [ 1038.100084][ T2337] BPF:, vararg [ 1038.100095][ T2337] BPF:) [ 1038.100104][ T2337] BPF: [ 1038.100113][ T2337] BPF:Invalid arg#1 [ 1038.100123][ T2337] BPF: [ 1038.100123][ T2337] [ 1038.125837][ T2338] BPF:return=0 args=( [ 1038.131095][ T2338] BPF:7936 01:11:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x8cffffff00000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1038.134217][ T2338] BPF:, vararg [ 1038.137583][ T2338] BPF:) [ 1038.141495][ T2338] BPF: [ 1038.144270][ T2338] BPF:Invalid arg#1 [ 1038.148410][ T2338] BPF: [ 1038.148410][ T2338] 01:11:55 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x2000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:55 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) clock_gettime(0x0, &(0x7f0000001e00)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001d00)=[{{&(0x7f00000001c0), 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/67, 0x43}, {&(0x7f0000000340)=""/107, 0x6b}, {&(0x7f00000003c0)=""/112, 0x70}, {&(0x7f0000000140)=""/29, 0x1d}], 0x4, &(0x7f0000000440)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf0}}, {{&(0x7f0000000600), 0x6e, &(0x7f0000000880)=[{&(0x7f0000000680)=""/72, 0x48}, {&(0x7f0000000540)=""/20, 0x14}, {&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/49, 0x31}, {&(0x7f0000000800)=""/122, 0x7a}], 0x5, &(0x7f0000000900)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000000940)=@abs, 0x6e, &(0x7f0000001b80)=[{&(0x7f00000009c0)=""/60, 0x3c}, {&(0x7f0000000a00)=""/217, 0xd9}, {&(0x7f0000000b00)=""/23, 0x17}, {&(0x7f0000000b40)=""/23, 0x17}, {&(0x7f0000000b80)=""/4096, 0x1000}], 0x5, &(0x7f0000001c00)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}}, {{0x0, 0x0, &(0x7f0000001c40), 0x0, &(0x7f0000001c80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x50}}], 0x4, 0x20, &(0x7f0000001e40)={r4, r5+10000000}) syz_open_dev$dri(&(0x7f0000001c40), 0x6a, 0x60000) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r6, 0xc02064b2, &(0x7f0000001e80)={0x1}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r3, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_GET_CAP(r3, 0xc010640c, &(0x7f0000000000)={0x4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r8}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r7, 0xc02064b2, &(0x7f0000001ec0)={0x8, 0x3, 0xe68}) 01:11:55 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x7ffffff8, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1038.334042][ T2355] BPF:[1] FUNC_PROTO (anon) [ 1038.338708][ T2355] BPF:return=0 args=( [ 1038.343976][ T2355] BPF:8192 [ 1038.347120][ T2355] BPF:, vararg [ 1038.351915][ T2355] BPF:) [ 1038.354695][ T2355] BPF: [ 1038.357460][ T2355] BPF:Invalid arg#1 [ 1038.366219][ T2362] BPF:[1] FUNC_PROTO (anon) [ 1038.366235][ T2362] BPF:return=0 args=( [ 1038.366246][ T2362] BPF:0 (anon) [ 1038.366256][ T2362] BPF:, 2 (invalid-name-offset) [ 1038.366265][ T2362] BPF:) [ 1038.366272][ T2362] BPF: [ 1038.366281][ T2362] BPF:Invalid arg#1 [ 1038.366289][ T2362] BPF: [ 1038.366289][ T2362] [ 1038.397391][ T2355] BPF: [ 1038.397391][ T2355] [ 1038.451344][ T2357] BPF:[1] FUNC_PROTO (anon) [ 1038.456476][ T2357] BPF:return=0 args=( [ 1038.461890][ T2357] BPF:8192 [ 1038.465447][ T2357] BPF:, vararg [ 1038.468912][ T2357] BPF:) [ 1038.471686][ T2357] BPF: [ 1038.474448][ T2357] BPF:Invalid arg#1 [ 1038.478251][ T2357] BPF: [ 1038.478251][ T2357] [ 1038.651872][ T2385] BPF:[1] FUNC_PROTO (anon) [ 1038.657053][ T2385] BPF:return=1946157056 args=( [ 1038.663232][ T2385] BPF:0 (anon) [ 1038.666638][ T2385] BPF:, 0 [ 1038.671064][ T2385] BPF:, vararg [ 1038.674453][ T2385] BPF:) [ 1038.677222][ T2385] BPF: [ 1038.681781][ T2385] BPF:Invalid return type [ 1038.686129][ T2385] BPF: [ 1038.686129][ T2385] [ 1038.695973][ T2386] BPF:[1] FUNC_PROTO (anon) 01:11:56 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x7a000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0xa, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:56 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x7ffffff9, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:56 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000340), 0x6, 0x509200) r4 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) r5 = creat(&(0x7f0000000380)='./file0\x00', 0x83) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f00000003c0)={0x20, 0x3, 0x9}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r4, 0xc01064b3, &(0x7f00000004c0)={r2}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) clone(0x80008000, &(0x7f00000001c0)="8c6d66171eadb3c4dddab4fef5ee133ff4de7c06078b21789081fc7064c88c06c016ba8adebe9fd9f0abaf1f4227710490357bc21211f5693316b23077e52b7cd362be9b6000ab5fec8c8f4c90b8eb1c7abd17094ebfa7d48423", &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000240)="661b911c5cb430fbb526dcd7c0313ec8e4fb6e009735968edf9c348aae578543cf689692597986b216ed81ffff902c4b7e24dde137f344f256e1f1fb8a116f11da1475f6f73c3da20bb06efdce6dfeb8d89eab25ff36589b41df75ae792d584a3deb8118dfcc3281d3718f2a39a4fb77fd26492a715fad882e44be6b950589373788a7d71f4c641aaf4ca7894fd6c36bb1a70e3614b298656cdd116ea6b0c067f296a49eb6536b300b346efd7def6c34ed36d91e1d24b44500") ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r6}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) r7 = syz_open_dev$amidi(&(0x7f0000000440), 0x1, 0x42041) splice(r3, &(0x7f0000000400)=0x9, r7, &(0x7f0000000480)=0xcdf, 0x9, 0x0) 01:11:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x97ffffff00000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1038.701899][ T2386] BPF:return=1946157056 args=( [ 1038.706671][ T2386] BPF:0 (anon) [ 1038.710084][ T2386] BPF:, 0 [ 1038.713110][ T2386] BPF:, vararg [ 1038.716479][ T2386] BPF:) [ 1038.719278][ T2386] BPF: [ 1038.722042][ T2386] BPF:Invalid return type [ 1038.726367][ T2386] BPF: [ 1038.726367][ T2386] 01:11:56 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x2e00}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1038.884177][ T2397] BPF:[1] FUNC_PROTO (anon) [ 1038.891417][ T2397] BPF:return=0 args=( [ 1038.895423][ T2397] BPF:0 (anon) [ 1038.898871][ T2397] BPF:, 2 (invalid-name-offset) [ 1038.903724][ T2397] BPF:) [ 1038.906076][ T2400] device vlan1252 entered promiscuous mode [ 1038.906483][ T2397] BPF: [ 1038.915087][ T2397] BPF:Invalid arg#1 [ 1038.918944][ T2397] BPF: [ 1038.918944][ T2397] [ 1038.946164][ T2401] BPF:[1] FUNC_PROTO (anon) [ 1038.951922][ T2401] BPF:return=0 args=( [ 1038.955924][ T2401] BPF:0 (anon) [ 1038.960505][ T2401] BPF:, 2 (invalid-name-offset) [ 1038.965579][ T2401] BPF:) [ 1038.968344][ T2401] BPF: [ 1038.972473][ T2401] BPF:Invalid arg#1 [ 1038.976291][ T2401] BPF: [ 1038.976291][ T2401] [ 1039.076772][ T2426] BPF:[1] FUNC_PROTO (anon) [ 1039.083950][ T2426] BPF:return=0 args=( [ 1039.087947][ T2426] BPF:11776 [ 1039.091242][ T2426] BPF:, vararg [ 1039.094623][ T2426] BPF:) [ 1039.097381][ T2426] BPF: [ 1039.100199][ T2426] BPF:Invalid arg#1 [ 1039.104073][ T2426] BPF: [ 1039.104073][ T2426] [ 1039.143300][ T2428] BPF:[1] FUNC_PROTO (anon) [ 1039.147974][ T2428] BPF:return=0 args=( [ 1039.153455][ T2428] BPF:11776 [ 1039.156666][ T2428] BPF:, vararg [ 1039.161690][ T2428] BPF:) [ 1039.164465][ T2428] BPF: [ 1039.167229][ T2428] BPF:Invalid arg#1 [ 1039.172477][ T2428] BPF: [ 1039.172477][ T2428] [ 1039.176641][ T2431] BPF:[1] FUNC_PROTO (anon) [ 1039.182895][ T2431] BPF:return=2046820352 args=( [ 1039.187686][ T2431] BPF:0 (anon) [ 1039.192066][ T2431] BPF:, 0 [ 1039.195105][ T2431] BPF:, vararg [ 1039.198476][ T2431] BPF:) [ 1039.202300][ T2431] BPF: [ 1039.205082][ T2431] BPF:Invalid return type [ 1039.210749][ T2431] BPF: [ 1039.210749][ T2431] 01:11:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xf6ffffff00000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:11:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0xc, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1039.251276][ T2432] BPF:[1] FUNC_PROTO (anon) [ 1039.255984][ T2432] BPF:return=2046820352 args=( [ 1039.261925][ T2432] BPF:0 (anon) [ 1039.265333][ T2432] BPF:, 0 [ 1039.268458][ T2432] BPF:, vararg [ 1039.271883][ T2432] BPF:) [ 1039.274646][ T2432] BPF: [ 1039.277414][ T2432] BPF:Invalid return type [ 1039.281794][ T2432] BPF: [ 1039.281794][ T2432] 01:11:56 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x4800}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:56 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xffffff1f, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:56 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xd2000000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1039.503654][ T2439] device vlan1253 entered promiscuous mode [ 1039.524645][ T2451] BPF:[1] FUNC_PROTO (anon) [ 1039.530652][ T2451] BPF:return=0 args=( [ 1039.533173][ T2455] BPF:[1] FUNC_PROTO (anon) [ 1039.534648][ T2451] BPF:0 (anon) [ 1039.534662][ T2451] BPF:, 2 (invalid-name-offset) [ 1039.534674][ T2451] BPF:) [ 1039.539289][ T2455] BPF:return=0 args=( [ 1039.539302][ T2455] BPF:0 (anon) [ 1039.539314][ T2455] BPF:, 2 (invalid-name-offset) [ 1039.539323][ T2455] BPF:) [ 1039.539401][ T2455] BPF: [ 1039.539412][ T2455] BPF:Invalid arg#1 [ 1039.539420][ T2455] BPF: [ 1039.539420][ T2455] [ 1039.566337][ T2457] BPF:[1] FUNC_PROTO (anon) [ 1039.569886][ T2451] BPF: [ 1039.569901][ T2451] BPF:Invalid arg#1 [ 1039.569911][ T2451] BPF: [ 1039.569911][ T2451] [ 1039.604094][ T2457] BPF:return=0 args=( [ 1039.608084][ T2457] BPF:18432 [ 1039.611363][ T2457] BPF:, vararg [ 1039.614738][ T2457] BPF:) [ 1039.617552][ T2457] BPF: [ 1039.620383][ T2457] BPF:Invalid arg#1 [ 1039.624200][ T2457] BPF: [ 1039.624200][ T2457] [ 1039.643901][ T2458] BPF:[1] FUNC_PROTO (anon) [ 1039.648572][ T2458] BPF:return=0 args=( [ 1039.654883][ T2458] BPF:18432 [ 1039.658093][ T2458] BPF:, vararg [ 1039.662503][ T2458] BPF:) [ 1039.665278][ T2458] BPF: [ 1039.668047][ T2458] BPF:Invalid arg#1 [ 1039.673224][ T2458] BPF: [ 1039.673224][ T2458] 01:11:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0xe, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:57 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x3}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xf9fdffff00000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1039.925198][ T2475] device vlan1254 entered promiscuous mode 01:11:57 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x4c00}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1039.971727][ T2481] BPF:[1] FUNC_PROTO (anon) [ 1039.976421][ T2481] BPF:return=0 args=( [ 1039.982908][ T2481] BPF:0 (anon) [ 1039.986301][ T2481] BPF:, 3 [ 1039.990848][ T2481] BPF:) [ 1039.993625][ T2481] BPF: [ 1039.996393][ T2481] BPF:Invalid arg#1 [ 1040.001350][ T2481] BPF: [ 1040.001350][ T2481] [ 1040.021350][ T2485] BPF:[1] FUNC_PROTO (anon) [ 1040.026009][ T2485] BPF:return=0 args=( [ 1040.030062][ T2485] BPF:0 (anon) [ 1040.033439][ T2485] BPF:, 3 [ 1040.036469][ T2485] BPF:) [ 1040.041698][ T2485] BPF: [ 1040.044488][ T2485] BPF:Invalid arg#1 [ 1040.048297][ T2485] BPF: [ 1040.048297][ T2485] 01:11:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xfcfdffff00000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:11:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0xf, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:57 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0xa}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1040.227945][ T2499] BPF:[1] FUNC_PROTO (anon) [ 1040.233852][ T2499] BPF:return=0 args=( [ 1040.236157][ T2500] BPF:[1] FUNC_PROTO (anon) [ 1040.237863][ T2499] BPF:19456 [ 1040.237880][ T2499] BPF:, vararg [ 1040.237889][ T2499] BPF:) [ 1040.243479][ T2500] BPF:return=0 args=( [ 1040.246009][ T2499] BPF: [ 1040.246022][ T2499] BPF:Invalid arg#1 [ 1040.246031][ T2499] BPF: [ 1040.246031][ T2499] [ 1040.271241][ T2500] BPF:19456 [ 1040.274452][ T2500] BPF:, vararg 01:11:57 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x5f00}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1040.277828][ T2500] BPF:) [ 1040.281950][ T2500] BPF: [ 1040.284722][ T2500] BPF:Invalid arg#1 [ 1040.288530][ T2500] BPF: [ 1040.288530][ T2500] [ 1040.405710][ T2519] device vlan1255 entered promiscuous mode [ 1040.424118][ T2525] BPF:[1] FUNC_PROTO (anon) [ 1040.429834][ T2525] BPF:return=0 args=( [ 1040.433835][ T2525] BPF:24320 [ 1040.437038][ T2525] BPF:, vararg [ 1040.441827][ T2525] BPF:) [ 1040.444609][ T2525] BPF: [ 1040.447376][ T2525] BPF:Invalid arg#1 [ 1040.452318][ T2525] BPF: [ 1040.452318][ T2525] [ 1040.465147][ T2518] BPF:[1] FUNC_PROTO (anon) [ 1040.472116][ T2518] BPF:return=0 args=( [ 1040.473649][ T2529] BPF:[1] FUNC_PROTO (anon) [ 1040.476114][ T2518] BPF:0 (anon) [ 1040.476127][ T2518] BPF:, 10 [ 1040.476136][ T2518] BPF:) [ 1040.476144][ T2518] BPF: [ 1040.481670][ T2529] BPF:return=0 args=( [ 1040.484334][ T2518] BPF:Invalid arg#1 [ 1040.487441][ T2529] BPF:24320 [ 1040.492150][ T2518] BPF: [ 1040.492150][ T2518] [ 1040.494264][ T2529] BPF:, vararg [ 1040.508303][ T2532] BPF:[1] FUNC_PROTO (anon) [ 1040.513115][ T2529] BPF:) [ 1040.513129][ T2529] BPF: [ 1040.513139][ T2529] BPF:Invalid arg#1 [ 1040.513148][ T2529] BPF: [ 1040.513148][ T2529] [ 1040.539877][ T2532] BPF:return=0 args=( [ 1040.543868][ T2532] BPF:0 (anon) [ 1040.547242][ T2532] BPF:, 10 [ 1040.551545][ T2532] BPF:) 01:11:58 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x6000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1040.554318][ T2532] BPF: [ 1040.557081][ T2532] BPF:Invalid arg#1 [ 1040.562194][ T2532] BPF: [ 1040.562194][ T2532] 01:11:58 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x1d}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xfdfdffff00000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1040.732620][ T2543] BPF:[1] FUNC_PROTO (anon) [ 1040.737292][ T2543] BPF:return=0 args=( [ 1040.742525][ T2543] BPF:24576 [ 1040.745738][ T2543] BPF:, vararg [ 1040.750505][ T2543] BPF:) [ 1040.753281][ T2543] BPF: [ 1040.756050][ T2543] BPF:Invalid arg#1 [ 1040.759915][ T2543] BPF: [ 1040.759915][ T2543] [ 1040.777605][ T2544] BPF:[1] FUNC_PROTO (anon) [ 1040.783290][ T2544] BPF:return=0 args=( [ 1040.787284][ T2544] BPF:24576 [ 1040.791478][ T2544] BPF:, vararg [ 1040.794858][ T2544] BPF:) [ 1040.797623][ T2544] BPF: [ 1040.801587][ T2544] BPF:Invalid arg#1 [ 1040.805408][ T2544] BPF: [ 1040.805408][ T2544] [ 1040.851065][ T2550] BPF:[1] FUNC_PROTO (anon) [ 1040.855731][ T2550] BPF:return=0 args=( [ 1040.862187][ T2550] BPF:0 (anon) [ 1040.865589][ T2550] BPF:, 29 [ 1040.869962][ T2550] BPF:) [ 1040.872736][ T2550] BPF: [ 1040.875503][ T2550] BPF:Invalid arg#1 [ 1040.880658][ T2550] BPF: [ 1040.880658][ T2550] [ 1040.892057][ T2551] BPF:[1] FUNC_PROTO (anon) [ 1040.896706][ T2551] BPF:return=0 args=( [ 1040.901902][ T2551] BPF:0 (anon) [ 1040.905286][ T2551] BPF:, 29 [ 1040.908395][ T2551] BPF:) [ 1040.911230][ T2551] BPF: [ 1040.913993][ T2551] BPF:Invalid arg#1 [ 1040.917797][ T2551] BPF: [ 1040.917797][ T2551] [ 1041.356171][ T2572] BPF:[1] FUNC_PROTO (anon) [ 1041.362921][ T2572] BPF:return=3523215360 args=( [ 1041.367708][ T2572] BPF:0 (anon) [ 1041.372474][ T2572] BPF:, 0 [ 1041.375508][ T2572] BPF:, vararg [ 1041.380172][ T2572] BPF:) [ 1041.382941][ T2572] BPF: [ 1041.385709][ T2572] BPF:Invalid return type [ 1041.391428][ T2572] BPF: [ 1041.391428][ T2572] [ 1041.402899][ T2573] BPF:[1] FUNC_PROTO (anon) [ 1041.407520][ T2573] BPF:return=3523215360 args=( [ 1041.413580][ T2573] BPF:0 (anon) [ 1041.416989][ T2573] BPF:, 0 [ 1041.421227][ T2573] BPF:, vararg [ 1041.424607][ T2573] BPF:) [ 1041.427377][ T2573] BPF: [ 1041.430320][ T2573] BPF:Invalid return type [ 1041.434646][ T2573] BPF: [ 1041.434646][ T2573] 01:11:59 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xffff0f00, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:11:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x10, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:59 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x6800}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:59 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x24}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xfdffffff00000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1041.616467][ T2582] BPF:[1] FUNC_PROTO (anon) [ 1041.623314][ T2582] BPF:return=0 args=( [ 1041.627517][ T2582] BPF:0 (anon) [ 1041.631958][ T2582] BPF:, 36 [ 1041.635086][ T2582] BPF:) [ 1041.637847][ T2582] BPF: [ 1041.640654][ T2582] BPF:Invalid arg#1 [ 1041.644460][ T2582] BPF: [ 1041.644460][ T2582] [ 1041.675213][ T2583] BPF:[1] FUNC_PROTO (anon) [ 1041.681022][ T2583] BPF:return=0 args=( [ 1041.685027][ T2583] BPF:0 (anon) [ 1041.687450][ T2587] BPF:[1] FUNC_PROTO (anon) [ 1041.688405][ T2583] BPF:, 36 [ 1041.694221][ T2587] BPF:return=0 args=( [ 1041.696168][ T2583] BPF:) [ 1041.696178][ T2583] BPF: [ 1041.696187][ T2583] BPF:Invalid arg#1 [ 1041.696196][ T2583] BPF: [ 1041.696196][ T2583] [ 1041.716389][ T2587] BPF:26624 [ 1041.720794][ T2587] BPF:, vararg [ 1041.724176][ T2587] BPF:) [ 1041.727386][ T2587] BPF: [ 1041.731605][ T2587] BPF:Invalid arg#1 [ 1041.735429][ T2587] BPF: [ 1041.735429][ T2587] [ 1041.745840][ T2591] BPF:[1] FUNC_PROTO (anon) [ 1041.752642][ T2591] BPF:return=0 args=( [ 1041.756649][ T2591] BPF:26624 [ 1041.761194][ T2591] BPF:, vararg [ 1041.764579][ T2591] BPF:) [ 1041.767344][ T2591] BPF: [ 1041.771265][ T2591] BPF:Invalid arg#1 [ 1041.775093][ T2591] BPF: [ 1041.775093][ T2591] 01:11:59 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x29}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:11:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x12, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xfeffffff00000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:11:59 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x6c00}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1042.069958][ T2616] BPF:[1] FUNC_PROTO (anon) [ 1042.074635][ T2616] BPF:return=0 args=( [ 1042.080106][ T2616] BPF:0 (anon) [ 1042.083497][ T2616] BPF:, 41 [ 1042.086609][ T2616] BPF:) [ 1042.090685][ T2616] BPF: [ 1042.093461][ T2616] BPF:Invalid arg#1 [ 1042.097269][ T2616] BPF: [ 1042.097269][ T2616] [ 1042.121598][ T2618] BPF:[1] FUNC_PROTO (anon) [ 1042.126271][ T2618] BPF:return=0 args=( [ 1042.131276][ T2618] BPF:0 (anon) [ 1042.134666][ T2618] BPF:, 41 [ 1042.138262][ T2618] BPF:) [ 1042.142402][ T2618] BPF: [ 1042.145176][ T2618] BPF:Invalid arg#1 [ 1042.150138][ T2618] BPF: [ 1042.150138][ T2618] [ 1042.158354][ T2622] device vlan1256 entered promiscuous mode [ 1042.246429][ T2629] BPF:[1] FUNC_PROTO (anon) [ 1042.252210][ T2629] BPF:return=0 args=( [ 1042.256214][ T2629] BPF:27648 [ 1042.260594][ T2629] BPF:, vararg [ 1042.263981][ T2629] BPF:) [ 1042.266751][ T2629] BPF: [ 1042.270982][ T2629] BPF:Invalid arg#1 [ 1042.274804][ T2629] BPF: [ 1042.274804][ T2629] 01:11:59 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2b}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1042.297186][ T2631] BPF:[1] FUNC_PROTO (anon) [ 1042.303209][ T2631] BPF:return=0 args=( [ 1042.307205][ T2631] BPF:27648 [ 1042.310488][ T2631] BPF:, vararg [ 1042.313863][ T2631] BPF:) [ 1042.316713][ T2631] BPF: [ 1042.319541][ T2631] BPF:Invalid arg#1 [ 1042.323350][ T2631] BPF: [ 1042.323350][ T2631] 01:11:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x19, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:11:59 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x7400}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1042.499984][ T2652] BPF:[1] FUNC_PROTO (anon) [ 1042.504673][ T2652] BPF:return=0 args=( [ 1042.510082][ T2652] BPF:0 (anon) [ 1042.513477][ T2652] BPF:, 43 [ 1042.516591][ T2652] BPF:) [ 1042.519443][ T2652] BPF: [ 1042.522212][ T2652] BPF:Invalid arg#1 [ 1042.526023][ T2652] BPF: [ 1042.526023][ T2652] [ 1042.545923][ T2653] BPF:[1] FUNC_PROTO (anon) [ 1042.552133][ T2653] BPF:return=0 args=( [ 1042.556132][ T2653] BPF:0 (anon) [ 1042.560746][ T2653] BPF:, 43 [ 1042.563871][ T2653] BPF:) [ 1042.566631][ T2653] BPF: [ 1042.569477][ T2653] BPF:Invalid arg#1 [ 1042.573284][ T2653] BPF: [ 1042.573284][ T2653] [ 1042.642331][ T2660] BPF:[1] FUNC_PROTO (anon) [ 1042.646962][ T2660] BPF:return=0 args=( [ 1042.652365][ T2660] BPF:29696 [ 1042.655581][ T2660] BPF:, vararg [ 1042.660253][ T2660] BPF:) [ 1042.663034][ T2660] BPF: [ 1042.665810][ T2660] BPF:Invalid arg#1 [ 1042.669701][ T2660] BPF: [ 1042.669701][ T2660] [ 1042.704771][ T2666] device vlan1257 entered promiscuous mode [ 1043.021797][ T2673] BPF:[1] FUNC_PROTO (anon) [ 1043.026425][ T2673] BPF:return=4294905600 args=( [ 1043.032399][ T2673] BPF:0 (anon) [ 1043.035807][ T2673] BPF:, 0 [ 1043.039877][ T2673] BPF:, vararg [ 1043.043259][ T2673] BPF:) [ 1043.046020][ T2673] BPF: [ 1043.049899][ T2673] BPF:Invalid return type [ 1043.054237][ T2673] BPF: [ 1043.054237][ T2673] [ 1043.063012][ T2674] BPF:[1] FUNC_PROTO (anon) 01:12:00 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xffffff00, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xfeffffffffffffff, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:12:00 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x32}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:00 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x7a00}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x2c, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1043.067616][ T2674] BPF:return=4294905600 args=( [ 1043.073697][ T2674] BPF:0 (anon) [ 1043.077082][ T2674] BPF:, 0 [ 1043.081364][ T2674] BPF:, vararg [ 1043.084739][ T2674] BPF:) [ 1043.087508][ T2674] BPF: [ 1043.091614][ T2674] BPF:Invalid return type [ 1043.095947][ T2674] BPF: [ 1043.095947][ T2674] [ 1043.227642][ T2686] BPF:[1] FUNC_PROTO (anon) [ 1043.233528][ T2686] BPF:return=0 args=( [ 1043.237557][ T2686] BPF:31232 [ 1043.242243][ T2686] BPF:, vararg [ 1043.245621][ T2686] BPF:) [ 1043.249408][ T2686] BPF: [ 1043.252178][ T2686] BPF:Invalid arg#1 [ 1043.255982][ T2686] BPF: [ 1043.255982][ T2686] [ 1043.267234][ T2688] BPF:[1] FUNC_PROTO (anon) [ 1043.273083][ T2688] BPF:return=0 args=( [ 1043.277079][ T2688] BPF:0 (anon) [ 1043.281578][ T2688] BPF:, 50 [ 1043.284703][ T2688] BPF:) [ 1043.287490][ T2688] BPF: [ 1043.291424][ T2688] BPF:Invalid arg#1 [ 1043.294282][ T2687] BPF:[1] FUNC_PROTO (anon) [ 1043.295237][ T2688] BPF: [ 1043.295237][ T2688] [ 1043.306908][ T2687] BPF:return=0 args=( [ 1043.312129][ T2687] BPF:31232 [ 1043.315335][ T2687] BPF:, vararg [ 1043.320252][ T2687] BPF:) [ 1043.323018][ T2687] BPF: [ 1043.325782][ T2687] BPF:Invalid arg#1 [ 1043.327580][ T2692] BPF:[1] FUNC_PROTO (anon) [ 1043.329620][ T2687] BPF: [ 1043.329620][ T2687] [ 1043.341323][ T2692] BPF:return=0 args=( [ 1043.345317][ T2692] BPF:0 (anon) [ 1043.350105][ T2692] BPF:, 50 [ 1043.353221][ T2692] BPF:) [ 1043.355981][ T2692] BPF: [ 1043.360038][ T2692] BPF:Invalid arg#1 [ 1043.363855][ T2692] BPF: [ 1043.363855][ T2692] 01:12:00 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x34}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1043.423371][ T2689] device vlan1258 entered promiscuous mode 01:12:01 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0xd200}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xff00000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:12:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x48, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1043.623893][ T2725] BPF:[1] FUNC_PROTO (anon) [ 1043.629623][ T2725] BPF:return=0 args=( [ 1043.633631][ T2725] BPF:53760 [ 1043.636836][ T2725] BPF:, vararg [ 1043.641721][ T2725] BPF:) [ 1043.644503][ T2725] BPF: [ 1043.647268][ T2725] BPF:Invalid arg#1 [ 1043.652287][ T2725] BPF: [ 1043.652287][ T2725] [ 1043.665902][ T2724] BPF:[1] FUNC_PROTO (anon) [ 1043.671674][ T2724] BPF:return=0 args=( [ 1043.676000][ T2724] BPF:0 (anon) [ 1043.680709][ T2724] BPF:, 52 [ 1043.683834][ T2724] BPF:) [ 1043.686603][ T2724] BPF: [ 1043.689445][ T2724] BPF:Invalid arg#1 [ 1043.693259][ T2724] BPF: [ 1043.693259][ T2724] [ 1043.704594][ T2726] BPF:[1] FUNC_PROTO (anon) [ 1043.709246][ T2726] BPF:return=0 args=( [ 1043.713230][ T2726] BPF:53760 [ 1043.716471][ T2726] BPF:, vararg [ 1043.719924][ T2726] BPF:) [ 1043.722686][ T2726] BPF: [ 1043.725446][ T2726] BPF:Invalid arg#1 [ 1043.729750][ T2726] BPF: [ 1043.729750][ T2726] [ 1043.759419][ T2728] BPF:[1] FUNC_PROTO (anon) [ 1043.764070][ T2728] BPF:return=0 args=( [ 1043.768053][ T2728] BPF:0 (anon) [ 1043.771528][ T2728] BPF:, 52 01:12:01 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x3fe}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1043.774639][ T2728] BPF:) [ 1043.777413][ T2728] BPF: [ 1043.780253][ T2728] BPF:Invalid arg#1 [ 1043.784055][ T2728] BPF: [ 1043.784055][ T2728] 01:12:01 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0xfffff}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1043.895095][ T2746] BPF:[1] FUNC_PROTO (anon) [ 1043.896446][ T2736] device vlan1259 entered promiscuous mode [ 1043.900843][ T2746] BPF:return=0 args=( [ 1043.910868][ T2746] BPF:0 (anon) [ 1043.914265][ T2746] BPF:, 1022 [ 1043.917551][ T2746] BPF:) [ 1043.920394][ T2746] BPF: [ 1043.923166][ T2746] BPF:Invalid arg#1 [ 1043.926973][ T2746] BPF: [ 1043.926973][ T2746] [ 1043.963387][ T2748] BPF:[1] FUNC_PROTO (anon) [ 1043.968051][ T2748] BPF:return=0 args=( [ 1043.973152][ T2748] BPF:0 (anon) [ 1043.976541][ T2748] BPF:, 1022 [ 1043.981203][ T2748] BPF:) [ 1043.983994][ T2748] BPF: [ 1043.986771][ T2748] BPF:Invalid arg#1 [ 1043.990673][ T2748] BPF: [ 1043.990673][ T2748] [ 1044.071300][ T2767] BPF:[1] FUNC_PROTO (anon) [ 1044.075994][ T2767] BPF:return=0 args=( [ 1044.080153][ T2769] BPF:[1] FUNC_PROTO (anon) [ 1044.080169][ T2769] BPF:return=0 args=( [ 1044.080180][ T2769] BPF:1048575 [ 1044.080189][ T2769] BPF:, vararg [ 1044.080198][ T2769] BPF:) [ 1044.080206][ T2769] BPF: [ 1044.080215][ T2769] BPF:Invalid arg#1 [ 1044.080223][ T2769] BPF: [ 1044.080223][ T2769] [ 1044.113767][ T2767] BPF:1048575 [ 1044.117140][ T2767] BPF:, vararg 01:12:01 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1044.120592][ T2767] BPF:) [ 1044.123360][ T2767] BPF: [ 1044.126132][ T2767] BPF:Invalid arg#1 [ 1044.129991][ T2767] BPF: [ 1044.129991][ T2767] [ 1044.256139][ T2772] BPF:[1] FUNC_PROTO (anon) [ 1044.262028][ T2772] BPF:return=0 args=( [ 1044.266085][ T2772] BPF:0 (anon) [ 1044.270766][ T2772] BPF:, 2 [ 1044.273808][ T2772] BPF:) [ 1044.276576][ T2772] BPF: [ 1044.280584][ T2772] BPF:Invalid arg#1 [ 1044.284409][ T2772] BPF: [ 1044.284409][ T2772] [ 1044.314170][ T2774] BPF:[1] FUNC_PROTO (anon) [ 1044.320070][ T2774] BPF:return=0 args=( [ 1044.324066][ T2774] BPF:0 (anon) [ 1044.327442][ T2774] BPF:, 2 [ 1044.331781][ T2774] BPF:) [ 1044.334557][ T2774] BPF: [ 1044.337322][ T2774] BPF:Invalid arg#1 [ 1044.342579][ T2774] BPF: [ 1044.342579][ T2774] [ 1046.351147][ T2787] BPF:[1] FUNC_PROTO (anon) [ 1046.355783][ T2787] BPF:return=4294967040 args=( [ 1046.359508][ T2789] BPF:[1] FUNC_PROTO (anon) [ 1046.361811][ T2787] BPF:0 (anon) [ 1046.365168][ T2789] BPF:return=4294967040 args=( [ 1046.369550][ T2787] BPF:, 0 [ 1046.369563][ T2787] BPF:, vararg [ 1046.369572][ T2787] BPF:) [ 1046.369582][ T2787] BPF: [ 1046.369591][ T2787] BPF:Invalid return type [ 1046.369601][ T2787] BPF: [ 1046.369601][ T2787] [ 1046.400127][ T2789] BPF:0 (anon) [ 1046.403506][ T2789] BPF:, 0 [ 1046.406528][ T2789] BPF:, vararg [ 1046.411020][ T2789] BPF:) [ 1046.413792][ T2789] BPF: [ 1046.416557][ T2789] BPF:Invalid return type [ 1046.421949][ T2789] BPF: [ 1046.421949][ T2789] 01:12:04 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x4a, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xff0f000000000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:12:04 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0xffffff}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:04 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x2}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1046.613482][ T2798] BPF:[1] FUNC_PROTO (anon) [ 1046.619479][ T2798] BPF:return=0 args=( [ 1046.623479][ T2798] BPF:0 (anon) [ 1046.626861][ T2798] BPF:, 0 [ 1046.631105][ T2798] BPF:, vararg [ 1046.634489][ T2798] BPF:) [ 1046.637254][ T2798] BPF: [ 1046.641147][ T2798] BPF:Invalid arg#1 [ 1046.645166][ T2798] BPF: [ 1046.645166][ T2798] [ 1046.657136][ T2802] BPF:[1] FUNC_PROTO (anon) [ 1046.663280][ T2802] BPF:return=0 args=( [ 1046.667276][ T2802] BPF:0 (anon) [ 1046.671694][ T2802] BPF:, 0 [ 1046.674726][ T2802] BPF:, vararg [ 1046.683052][ T2802] BPF:) [ 1046.685828][ T2802] BPF: [ 1046.689675][ T2802] BPF:Invalid arg#1 [ 1046.693486][ T2802] BPF: [ 1046.693486][ T2802] [ 1046.750360][ T2800] BPF:[1] FUNC_PROTO (anon) [ 1046.751617][ T2806] BPF:Invalid string section [ 1046.755078][ T2800] BPF:return=0 args=( [ 1046.764870][ T2800] BPF:16777215 [ 1046.769406][ T2800] BPF:, vararg [ 1046.772786][ T2800] BPF:) [ 1046.775548][ T2800] BPF: [ 1046.779381][ T2800] BPF:Invalid arg#1 [ 1046.783198][ T2800] BPF: [ 1046.783198][ T2800] [ 1046.805496][ T2812] BPF:Invalid string section [ 1046.805947][ T2813] BPF:[1] FUNC_PROTO (anon) [ 1046.816083][ T2813] BPF:return=0 args=( [ 1046.820139][ T2813] BPF:16777215 [ 1046.823603][ T2813] BPF:, vararg [ 1046.826973][ T2813] BPF:) [ 1046.829810][ T2813] BPF: [ 1046.832574][ T2813] BPF:Invalid arg#1 [ 1046.836377][ T2813] BPF: [ 1046.836377][ T2813] 01:12:04 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x3}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1046.861653][ T2804] device vlan1260 entered promiscuous mode 01:12:04 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x2}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xffffff7f00000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:12:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x4c, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1047.070785][ T2830] BPF:Invalid string section 01:12:04 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x1000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:04 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x4}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1047.310571][ T2852] BPF:[1] FUNC_PROTO (anon) [ 1047.315357][ T2852] BPF:return=0 args=( [ 1047.320834][ T2852] BPF:0 (invalid-name-offset) [ 1047.325567][ T2852] BPF:, 0 [ 1047.330091][ T2852] BPF:, vararg [ 1047.333510][ T2852] BPF:) [ 1047.336278][ T2852] BPF: [ 1047.340379][ T2852] BPF:Invalid arg#1 [ 1047.344265][ T2852] BPF: [ 1047.344265][ T2852] [ 1047.344537][ T2855] BPF:[1] FUNC_PROTO (anon) [ 1047.356292][ T2855] BPF:return=0 args=( [ 1047.361622][ T2855] BPF:16777216 [ 1047.365208][ T2855] BPF:, vararg [ 1047.368652][ T2855] BPF:) [ 1047.371438][ T2855] BPF: [ 1047.374199][ T2855] BPF:Invalid arg#1 [ 1047.378076][ T2855] BPF: [ 1047.378076][ T2855] [ 1047.387837][ T2854] BPF:[1] FUNC_PROTO (anon) [ 1047.393651][ T2854] BPF:return=0 args=( [ 1047.397643][ T2854] BPF:0 (invalid-name-offset) [ 1047.401056][ T2864] BPF:Invalid string section [ 1047.402377][ T2854] BPF:, 0 [ 1047.410007][ T2854] BPF:, vararg [ 1047.411532][ T2860] BPF:[1] FUNC_PROTO (anon) [ 1047.413379][ T2854] BPF:) [ 1047.413389][ T2854] BPF: [ 1047.420054][ T2860] BPF:return=0 args=( [ 1047.420757][ T2854] BPF:Invalid arg#1 [ 1047.423503][ T2860] BPF:16777216 [ 1047.427464][ T2854] BPF: [ 1047.427464][ T2854] [ 1047.431294][ T2860] BPF:, vararg [ 1047.445077][ T2860] BPF:) [ 1047.447840][ T2860] BPF: [ 1047.451871][ T2860] BPF:Invalid arg#1 [ 1047.455678][ T2860] BPF: [ 1047.455678][ T2860] 01:12:05 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x5}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xffffffff00000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:12:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x60, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:05 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:05 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x2000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:05 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x6}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1047.723777][ T2878] BPF:Invalid string section [ 1047.737405][ T2882] BPF:Invalid string section [ 1047.884082][ T2895] BPF:[1] FUNC_PROTO (anon) [ 1047.890041][ T2895] BPF:return=0 args=( [ 1047.894051][ T2895] BPF:0 (invalid-name-offset) [ 1047.899034][ T2895] BPF:, 0 [ 1047.902073][ T2895] BPF:, vararg [ 1047.905463][ T2895] BPF:) [ 1047.910626][ T2895] BPF: [ 1047.913403][ T2895] BPF:Invalid arg#1 [ 1047.917209][ T2895] BPF: [ 1047.917209][ T2895] [ 1047.945008][ T2884] device vlan1261 entered promiscuous mode [ 1047.954848][ T2901] BPF:[1] FUNC_PROTO (anon) [ 1047.961021][ T2901] BPF:return=0 args=( [ 1047.965024][ T2901] BPF:33554432 [ 1047.966802][ T2896] BPF:[1] FUNC_PROTO (anon) [ 1047.968543][ T2901] BPF:, vararg [ 1047.968555][ T2901] BPF:) [ 1047.968564][ T2901] BPF: [ 1047.968575][ T2901] BPF:Invalid arg#1 [ 1047.968584][ T2901] BPF: [ 1047.968584][ T2901] [ 1047.979558][ T2909] BPF:[1] FUNC_PROTO (anon) [ 1047.982224][ T2896] BPF:return=0 args=( [ 1047.982237][ T2896] BPF:0 (invalid-name-offset) [ 1047.982249][ T2896] BPF:, 0 [ 1047.982258][ T2896] BPF:, vararg [ 1047.985001][ T2909] BPF:return=0 args=( [ 1047.988830][ T2896] BPF:) [ 1047.988839][ T2896] BPF: [ 1047.988848][ T2896] BPF:Invalid arg#1 [ 1047.988857][ T2896] BPF: [ 1047.988857][ T2896] [ 1048.036892][ T2909] BPF:33554432 [ 1048.041776][ T2909] BPF:, vararg [ 1048.045168][ T2909] BPF:) [ 1048.049077][ T2909] BPF: [ 1048.051876][ T2909] BPF:Invalid arg#1 [ 1048.055686][ T2909] BPF: [ 1048.055686][ T2909] 01:12:05 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x3000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xfffffffffffffffe, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:12:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x68, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:05 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1048.301761][ T2920] BPF:[1] FUNC_PROTO (anon) [ 1048.306460][ T2920] BPF:return=0 args=( [ 1048.311734][ T2920] BPF:50331648 [ 1048.315213][ T2920] BPF:, vararg [ 1048.319692][ T2920] BPF:) [ 1048.322471][ T2920] BPF: [ 1048.325242][ T2920] BPF:Invalid arg#1 [ 1048.330215][ T2920] BPF: [ 1048.330215][ T2920] [ 1048.346718][ T2924] BPF:[1] FUNC_PROTO (anon) 01:12:05 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f00000003c0)={0x3, 0x100, 0x13d9, 0x8, 0x1, [0x9, 0x10001, 0x81, 0x5], [0x6, 0x9, 0x6, 0x7], [0x8, 0x8, 0x8, 0x6], [0x3, 0x2de80b79, 0x4b5, 0x7]}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000140)={&(0x7f0000000000)=[0x7fffffff, 0x5, 0x4, 0xb044, 0x5, 0x1e, 0x0, 0x2, 0xfffd, 0x1], 0xa, 0x800, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {0x0}, {}, {}, {}, {}, {}]}) r4 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x880) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CURSOR2(0xffffffffffffffff, 0xc02464bb, &(0x7f0000000480)={0x4, 0x401, 0x80, 0x3, 0x23511c97, 0x8635, 0x7f, 0x10001, 0x8}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000580)={0x80, 0xc4, 0x7f, 0x20203843, 0x0, [0x6, 0x0, 0xccef, 0x7f4], [0x800, 0x4000000], [0x0, 0x7, 0x4], [0x0, 0xa89, 0x5]}) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000440)={0x9, 0x1, 0x8, 0x467e, 0x1}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f0000000380)={r3, 0x2, &(0x7f0000000240)=[0x2, 0xffffffff], &(0x7f0000000280)=[0x0, 0x7ff, 0x4, 0x2, 0x2], 0x2, 0x6, 0x0, &(0x7f00000002c0)=[0x40, 0x3ff, 0x1, 0xffff, 0x1, 0x388], &(0x7f0000000340)=[0x8001, 0x1ff, 0x10001, 0x2]}) r5 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r6}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1048.353643][ T2924] BPF:return=0 args=( [ 1048.357676][ T2924] BPF:50331648 [ 1048.362374][ T2924] BPF:, vararg [ 1048.365758][ T2924] BPF:) [ 1048.369908][ T2924] BPF: [ 1048.372681][ T2924] BPF:Invalid arg#1 [ 1048.376570][ T2924] BPF: [ 1048.376570][ T2924] [ 1048.412429][ T2935] device vlan1262 entered promiscuous mode 01:12:06 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x4000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1048.452866][ T2942] BPF:[1] FUNC_PROTO (anon) [ 1048.457546][ T2942] BPF:return=0 args=( [ 1048.462799][ T2942] BPF:0 (invalid-name-offset) [ 1048.467493][ T2942] BPF:, 0 [ 1048.471742][ T2942] BPF:, vararg [ 1048.475211][ T2942] BPF:) [ 1048.479285][ T2942] BPF: [ 1048.482140][ T2942] BPF:Invalid arg#1 [ 1048.486126][ T2942] BPF: [ 1048.486126][ T2942] [ 1048.514665][ T2943] BPF:[1] FUNC_PROTO (anon) [ 1048.520667][ T2943] BPF:return=0 args=( [ 1048.524677][ T2943] BPF:0 (invalid-name-offset) [ 1048.530631][ T2943] BPF:, 0 [ 1048.533664][ T2943] BPF:, vararg [ 1048.537039][ T2943] BPF:) [ 1048.540935][ T2943] BPF: [ 1048.543708][ T2943] BPF:Invalid arg#1 [ 1048.547511][ T2943] BPF: [ 1048.547511][ T2943] 01:12:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0xffffffffffffffff, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:12:06 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x5}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1048.653492][ T2957] BPF:[1] FUNC_PROTO (anon) [ 1048.659383][ T2957] BPF:return=0 args=( [ 1048.663387][ T2957] BPF:67108864 [ 1048.666852][ T2957] BPF:, vararg [ 1048.671612][ T2957] BPF:) [ 1048.674403][ T2957] BPF: [ 1048.677174][ T2957] BPF:Invalid arg#1 [ 1048.682249][ T2957] BPF: [ 1048.682249][ T2957] 01:12:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x6c, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:06 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x5000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1048.709621][ T2959] BPF:[1] FUNC_PROTO (anon) [ 1048.714274][ T2959] BPF:return=0 args=( [ 1048.719496][ T2959] BPF:67108864 [ 1048.722968][ T2959] BPF:, vararg [ 1048.726340][ T2959] BPF:) [ 1048.730373][ T2959] BPF: [ 1048.733144][ T2959] BPF:Invalid arg#1 [ 1048.736948][ T2959] BPF: [ 1048.736948][ T2959] 01:12:06 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x402000) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) process_vm_writev(r2, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/122, 0x7a}, {&(0x7f0000000340)=""/205, 0xcd}, {&(0x7f0000000240)=""/101, 0x65}], 0x3, &(0x7f00000002c0)=[{&(0x7f0000000440)=""/92, 0x5c}], 0x1, 0x0) readv(r1, &(0x7f0000000600)=[{&(0x7f00000004c0)=""/250, 0xfa}, {&(0x7f00000005c0)=""/7, 0x7}], 0x2) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r4}) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) recvmsg$qrtr(r5, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001840)=[{&(0x7f00000007c0)=""/113, 0x71}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x2, &(0x7f0000001880)=[{0x48, 0x0, 0x0, ""/53}, {0x50, 0x0, 0x0, ""/61}], 0x98, 0x140}, 0x38, 0x120) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1048.885824][ T2969] BPF:[1] FUNC_PROTO (anon) [ 1048.892796][ T2969] BPF:return=0 args=( [ 1048.897010][ T2969] BPF:0 (invalid-name-offset) [ 1048.903023][ T2969] BPF:, 0 [ 1048.906068][ T2969] BPF:, vararg [ 1048.909478][ T2969] BPF:) [ 1048.912247][ T2969] BPF: [ 1048.915011][ T2969] BPF:Invalid arg#1 [ 1048.918853][ T2969] BPF: [ 1048.918853][ T2969] [ 1048.932344][ T2968] device vlan1263 entered promiscuous mode [ 1048.953817][ T2972] BPF:[1] FUNC_PROTO (anon) [ 1048.959896][ T2972] BPF:return=0 args=( [ 1048.963894][ T2972] BPF:0 (invalid-name-offset) [ 1048.969855][ T2972] BPF:, 0 [ 1048.972884][ T2972] BPF:, vararg [ 1048.976249][ T2972] BPF:) [ 1048.979043][ T2972] BPF: [ 1048.981822][ T2972] BPF:Invalid arg#1 [ 1048.985623][ T2972] BPF: [ 1048.985623][ T2972] [ 1049.062920][ T2989] BPF:[1] FUNC_PROTO (anon) [ 1049.067596][ T2989] BPF:return=0 args=( [ 1049.072931][ T2989] BPF:83886080 [ 1049.076402][ T2989] BPF:, vararg [ 1049.081305][ T2989] BPF:) [ 1049.084103][ T2989] BPF: [ 1049.086874][ T2989] BPF:Invalid arg#1 [ 1049.091675][ T2989] BPF: [ 1049.091675][ T2989] [ 1049.148039][ T2995] BPF:[1] FUNC_PROTO (anon) [ 1049.152713][ T2995] BPF:return=0 args=( [ 1049.156699][ T2995] BPF:83886080 [ 1049.162677][ T2995] BPF:, vararg [ 1049.166060][ T2995] BPF:) [ 1049.170000][ T2995] BPF: [ 1049.172774][ T2995] BPF:Invalid arg#1 [ 1049.176584][ T2995] BPF: [ 1049.176584][ T2995] 01:12:06 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x7}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:06 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x101) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:12:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x74, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:06 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x6}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:06 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x6000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x25, r1}}]}) [ 1049.301663][ T3005] BPF:Invalid string section [ 1049.437585][ T3013] hfsplus: unable to parse mount options [ 1049.454904][ T3017] BPF:[1] FUNC_PROTO (anon) [ 1049.461560][ T3017] BPF:return=0 args=( [ 1049.465562][ T3017] BPF:0 (invalid-name-offset) [ 1049.471334][ T3017] BPF:, 0 [ 1049.474371][ T3017] BPF:, vararg [ 1049.479316][ T3017] BPF:) [ 1049.482091][ T3017] BPF: [ 1049.484859][ T3017] BPF:Invalid arg#1 [ 1049.485357][ T3025] BPF:[1] FUNC_PROTO (anon) [ 1049.488741][ T3017] BPF: [ 1049.488741][ T3017] [ 1049.501272][ T3025] BPF:return=0 args=( [ 1049.504654][ T3019] BPF:[1] FUNC_PROTO (anon) [ 1049.505293][ T3025] BPF:100663296 [ 1049.505306][ T3025] BPF:, vararg [ 1049.512362][ T3019] BPF:return=0 args=( [ 1049.514947][ T3025] BPF:) [ 1049.514957][ T3025] BPF: [ 1049.514967][ T3025] BPF:Invalid arg#1 [ 1049.514977][ T3025] BPF: [ 1049.514977][ T3025] [ 1049.536580][ T3019] BPF:0 (invalid-name-offset) [ 1049.541334][ T3019] BPF:, 0 [ 1049.544357][ T3019] BPF:, vararg [ 1049.547777][ T3019] BPF:) [ 1049.550536][ T3019] BPF: [ 1049.553299][ T3019] BPF:Invalid arg#1 [ 1049.557102][ T3019] BPF: [ 1049.557102][ T3019] [ 1049.557356][ T3029] BPF:[1] FUNC_PROTO (anon) [ 1049.568801][ T3029] BPF:return=0 args=( [ 1049.572803][ T3029] BPF:100663296 [ 1049.576382][ T3029] BPF:, vararg [ 1049.580666][ T3029] BPF:) [ 1049.583441][ T3029] BPF: 01:12:07 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x9, 0x2, 0x20000007}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:12:07 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x7000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1049.586207][ T3029] BPF:Invalid arg#1 [ 1049.591120][ T3029] BPF: [ 1049.591120][ T3029] [ 1049.609021][ T3032] device vlan1264 entered promiscuous mode [ 1049.689136][ T3043] hfsplus: unable to parse mount options 01:12:07 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x7}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x7a, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}, 0x7}]}) [ 1049.856822][ T3054] BPF:[1] FUNC_PROTO (anon) [ 1049.862816][ T3054] BPF:return=0 args=( [ 1049.866823][ T3054] BPF:117440512 [ 1049.870455][ T3054] BPF:, vararg [ 1049.873835][ T3054] BPF:) [ 1049.876600][ T3054] BPF: [ 1049.879403][ T3054] BPF:Invalid arg#1 [ 1049.883212][ T3054] BPF: [ 1049.883212][ T3054] [ 1049.904171][ T3055] BPF:[1] FUNC_PROTO (anon) [ 1049.911107][ T3055] BPF:return=0 args=( [ 1049.915104][ T3055] BPF:117440512 [ 1049.918721][ T3055] BPF:, vararg [ 1049.922110][ T3055] BPF:) [ 1049.924869][ T3055] BPF: [ 1049.927626][ T3055] BPF:Invalid arg#1 [ 1049.931499][ T3055] BPF: [ 1049.931499][ T3055] [ 1049.974875][ T3068] BPF:[1] FUNC_PROTO (anon) [ 1049.980731][ T3068] BPF:return=0 args=( [ 1049.984739][ T3068] BPF:0 (invalid-name-offset) [ 1049.990773][ T3068] BPF:, 0 [ 1049.993809][ T3068] BPF:, vararg [ 1049.997181][ T3068] BPF:) [ 1050.001180][ T3068] BPF: [ 1050.003958][ T3068] BPF:Invalid arg#1 [ 1050.009011][ T3068] BPF: [ 1050.009011][ T3068] 01:12:07 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x8000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1050.132065][ T3073] device vlan1265 entered promiscuous mode [ 1050.169435][ T3076] hfsplus: unable to parse mount options [ 1050.266436][ T3085] hfsplus: unable to parse mount options [ 1050.281731][ T3092] BPF:[1] FUNC_PROTO (anon) [ 1050.286381][ T3092] BPF:return=0 args=( [ 1050.292779][ T3092] BPF:134217728 [ 1050.296342][ T3092] BPF:, vararg [ 1050.300727][ T3092] BPF:) [ 1050.303502][ T3092] BPF: [ 1050.306269][ T3092] BPF:Invalid arg#1 [ 1050.311370][ T3092] BPF: [ 1050.311370][ T3092] [ 1050.322831][ T3094] BPF:[1] FUNC_PROTO (anon) [ 1050.327481][ T3094] BPF:return=0 args=( [ 1050.333277][ T3094] BPF:134217728 [ 1050.336834][ T3094] BPF:, vararg [ 1050.341639][ T3094] BPF:) [ 1050.344413][ T3094] BPF: [ 1050.347174][ T3094] BPF:Invalid arg#1 [ 1050.351053][ T3094] BPF: [ 1050.351053][ T3094] 01:12:08 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x8}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:08 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x10001}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f00000001c0)={&(0x7f0000000000)=[0x9], 0x1, 0x1, 0x27, 0x9, 0x2, 0x9, 0xfffffffe, {0x9, 0x1, 0x3f8, 0x1, 0xfff, 0x7, 0x7f, 0x4c33, 0x5, 0x1a4, 0x17, 0x7fff, 0xfffffff7, 0x4, "e26dd3f3518a5f042256d3e2669fe58ed01a590b2e4c365f2ca94e4d0f22e2cb"}}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000100)) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f00000002c0)) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000140)={0x9, 0xd1, 0x1000}) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000240)={0x7728, 0xaf66, 0x7}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r4}) r5 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r5, 0xc00464b4, &(0x7f0000000280)={r2}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:12:08 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x8}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x84, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:08 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0xa000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}, 0x39}]}) [ 1050.514685][ T3101] BPF:Invalid string section [ 1050.527359][ T3101] BPF:Invalid string section [ 1050.667437][ T3112] hfsplus: gid requires an argument [ 1050.673881][ T3112] hfsplus: unable to parse mount options [ 1050.681102][ T3122] BPF:[1] FUNC_PROTO (anon) [ 1050.681119][ T3122] BPF:return=0 args=( [ 1050.681131][ T3122] BPF:167772160 [ 1050.681141][ T3122] BPF:, vararg [ 1050.681150][ T3122] BPF:) [ 1050.681158][ T3122] BPF: [ 1050.681167][ T3122] BPF:Invalid arg#1 [ 1050.681177][ T3122] BPF: [ 1050.681177][ T3122] [ 1050.737378][ T3126] BPF:[1] FUNC_PROTO (anon) [ 1050.743604][ T3126] BPF:return=0 args=( [ 1050.747901][ T3126] BPF:167772160 [ 1050.751456][ T3126] BPF:, vararg [ 1050.754828][ T3126] BPF:) [ 1050.757627][ T3126] BPF: [ 1050.760390][ T3126] BPF:Invalid arg#1 [ 1050.764194][ T3126] BPF: [ 1050.764194][ T3126] [ 1050.767315][ T3119] device vlan1266 entered promiscuous mode 01:12:08 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0xa}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:08 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0xa9d, 0x8}) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f00000001c0)={&(0x7f0000000000)=[0xfff, 0xda1, 0x0, 0x5, 0xcf, 0x10000, 0xfffffffc, 0x51], 0x8, 0x9, 0xffffffff, 0x8000, 0x1ff, 0x8000, 0x10001, {0xfffffffd, 0x8, 0x6, 0xfe, 0x7f, 0x1, 0x8, 0x2, 0xf82b, 0x5, 0x20, 0x9, 0xfdb, 0x24000000, "fb83b0398bee1153b55496dcf568085d876092ee6b858346562205ca03e3c543"}}) [ 1050.846699][ T3135] BPF:Invalid string section [ 1050.855357][ T3140] hfsplus: gid requires an argument [ 1050.861864][ T3140] hfsplus: unable to parse mount options [ 1050.875699][ T3141] BPF:Invalid string section 01:12:08 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x1c000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x9d, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}, 0x3c}]}) [ 1051.066553][ T3155] BPF:Invalid string section 01:12:08 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x11}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1051.094289][ T3156] BPF:Invalid string section 01:12:08 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) clone(0x1a00, &(0x7f0000000000)="6db8c4a392e8814d53526f8dc4f6e99c3b87e56f1f4a768887807ca433f865eb79f5c3349f73d172bfcc4138ad8000e17bef18128f4fb956f6", &(0x7f0000000380), &(0x7f00000001c0), &(0x7f0000000200)="e0c903eac99d6e91731a66bfd57a9222a2bec9cfbe74ca3dc8494df15d0d60a1b2d851f59051946a74ca3b41dc8ea58a2147bcd399f1f2b994c415424f311bcfef9f42d5dc0c99bb8770a5fb20978da05ba39da4891df120d7c106faadbd8494e91adc56cbf680e7a58fe40f8a869d29f0cd0a35d3a61d0c8d47dd2c4edb659b7cad38a2aff744290148ff36131dc16ae9ad997c92ed3311612cf997c5740dc68cdf879c2b6d9fc3627b40627c33793183c9b9ad2f376009190935a2e7ad099e5f6789fe53e4575e1054f6fed68226be6fcbf3ed97e0f21bff2f00fba5d351") ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000340), 0x5, 0x202241) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000140)={r1}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000300)={r4}) syz_open_dev$dri(&(0x7f0000000180), 0x80000001, 0x40100) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1051.235522][ T3169] BPF:[1] FUNC_PROTO (anon) [ 1051.241377][ T3169] BPF:return=0 args=( [ 1051.245376][ T3169] BPF:469762048 [ 1051.250207][ T3169] BPF:, vararg [ 1051.253923][ T3169] BPF:) [ 1051.256701][ T3169] BPF: [ 1051.260831][ T3169] BPF:Invalid arg#1 [ 1051.264645][ T3169] BPF: [ 1051.264645][ T3169] 01:12:08 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x1c}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1051.284250][ T3175] BPF:[1] FUNC_PROTO (anon) [ 1051.290004][ T3175] BPF:return=0 args=( [ 1051.290313][ T3176] device vlan1267 entered promiscuous mode [ 1051.293991][ T3175] BPF:469762048 [ 1051.304702][ T3175] BPF:, vararg [ 1051.307890][ T3177] BPF:Invalid string section [ 1051.309156][ T3175] BPF:) [ 1051.315571][ T3175] BPF: [ 1051.319424][ T3175] BPF:Invalid arg#1 [ 1051.323240][ T3175] BPF: [ 1051.323240][ T3175] [ 1051.327959][ T3181] BPF:Invalid string section [ 1051.369120][ T3182] hfsplus: unable to parse mount options [ 1051.433730][ T3193] hfsplus: unable to parse mount options [ 1051.554491][ T3207] BPF:Invalid string section [ 1051.575613][ T3214] BPF:Invalid string section [ 1051.595978][ T3216] BPF:[1] FUNC_PROTO (anon) [ 1051.601963][ T3216] BPF:return=0 args=( [ 1051.605963][ T3216] BPF:0 (invalid-name-offset) [ 1051.611967][ T3216] BPF:, 0 [ 1051.615004][ T3216] BPF:, vararg [ 1051.619590][ T3216] BPF:) [ 1051.622360][ T3216] BPF: [ 1051.625126][ T3216] BPF:Invalid arg#1 [ 1051.630085][ T3216] BPF: [ 1051.630085][ T3216] 01:12:09 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xa}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:09 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x1e000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:09 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x1e}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0xa3, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:12:09 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r3, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) r4 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000040)={0x4000002, 0x100, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r6}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1051.875311][ T3232] BPF:Invalid string section [ 1051.894560][ T3229] BPF:Invalid string section [ 1051.910864][ T3239] hfsplus: gid requires an argument [ 1051.916087][ T3239] hfsplus: unable to parse mount options 01:12:09 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x48}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1051.942114][ T3231] device vlan1268 entered promiscuous mode [ 1051.969587][ T3245] BPF:[1] FUNC_PROTO (anon) [ 1051.974238][ T3245] BPF:return=0 args=( [ 1051.980600][ T3245] BPF:503316480 [ 1051.984195][ T3245] BPF:, vararg [ 1051.988861][ T3245] BPF:) [ 1051.991633][ T3245] BPF: [ 1051.994390][ T3245] BPF:Invalid arg#1 [ 1051.999326][ T3245] BPF: [ 1051.999326][ T3245] [ 1052.016860][ T3252] BPF:[1] FUNC_PROTO (anon) [ 1052.024090][ T3252] BPF:return=0 args=( [ 1052.028146][ T3252] BPF:503316480 [ 1052.031692][ T3252] BPF:, vararg [ 1052.035065][ T3252] BPF:) [ 1052.037890][ T3252] BPF: [ 1052.040649][ T3252] BPF:Invalid arg#1 [ 1052.044448][ T3252] BPF: [ 1052.044448][ T3252] [ 1052.073920][ T3255] BPF:[1] FUNC_PROTO (anon) [ 1052.079800][ T3255] BPF:return=0 args=( [ 1052.083799][ T3255] BPF:0 (invalid-name-offset) [ 1052.089931][ T3255] BPF:, 0 [ 1052.092967][ T3255] BPF:, vararg [ 1052.096344][ T3255] BPF:) [ 1052.100292][ T3255] BPF: [ 1052.103072][ T3255] BPF:Invalid arg#1 [ 1052.106878][ T3255] BPF: [ 1052.106878][ T3255] [ 1052.124693][ T3256] BPF:[1] FUNC_PROTO (anon) [ 1052.131599][ T3256] BPF:return=0 args=( [ 1052.135599][ T3256] BPF:0 (invalid-name-offset) 01:12:09 executing program 0: clone(0x21100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0xc07, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) wait4(0x0, &(0x7f0000000000), 0x2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) r4 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r4, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800, 0x0, 0xfffffffd]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000140)={0x9c48, 0x800ffff, 0x8}) [ 1052.141450][ T3256] BPF:, 0 [ 1052.144481][ T3256] BPF:, vararg [ 1052.149152][ T3256] BPF:) [ 1052.151917][ T3256] BPF: [ 1052.154677][ T3256] BPF:Invalid arg#1 [ 1052.159698][ T3256] BPF: [ 1052.159698][ T3256] [ 1052.206766][ T3260] hfsplus: gid requires an argument [ 1052.213191][ T3260] hfsplus: unable to parse mount options 01:12:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0xed, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:09 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x1f000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:09 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x11}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1052.358034][ T3266] BPF:Invalid string section 01:12:09 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x4c}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}], [], 0x2}) [ 1052.524337][ T3281] BPF:[1] FUNC_PROTO (anon) [ 1052.530140][ T3281] BPF:return=0 args=( [ 1052.534267][ T3281] BPF:520093696 [ 1052.539030][ T3281] BPF:, vararg [ 1052.542453][ T3281] BPF:) [ 1052.545219][ T3281] BPF: [ 1052.549211][ T3281] BPF:Invalid arg#1 [ 1052.553039][ T3281] BPF: [ 1052.553039][ T3281] [ 1052.597315][ T3287] device vlan1269 entered promiscuous mode [ 1052.609244][ T3285] BPF:[1] FUNC_PROTO (anon) [ 1052.613914][ T3285] BPF:return=0 args=( [ 1052.619195][ T3285] BPF:520093696 [ 1052.622755][ T3285] BPF:, vararg [ 1052.626125][ T3285] BPF:) [ 1052.628975][ T3285] BPF: [ 1052.631910][ T3285] BPF:Invalid arg#1 [ 1052.635716][ T3285] BPF: [ 1052.635716][ T3285] [ 1052.657200][ T3293] BPF:[1] FUNC_PROTO (anon) [ 1052.663096][ T3293] BPF:return=0 args=( [ 1052.667098][ T3293] BPF:0 (invalid-name-offset) [ 1052.672977][ T3293] BPF:, 0 [ 1052.676013][ T3293] BPF:, vararg [ 1052.680716][ T3293] BPF:) [ 1052.683488][ T3293] BPF: [ 1052.686603][ T3293] BPF:Invalid arg#1 [ 1052.691726][ T3293] BPF: [ 1052.691726][ T3293] 01:12:10 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0xffffffff, 0x9}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r2, 0xc0086421, &(0x7f0000000140)={r4, 0x1}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1052.717198][ T3294] BPF:[1] FUNC_PROTO (anon) [ 1052.723462][ T3294] BPF:return=0 args=( [ 1052.727532][ T3294] BPF:0 (invalid-name-offset) [ 1052.732209][ T3294] BPF:, 0 [ 1052.735234][ T3294] BPF:, vararg [ 1052.738681][ T3294] BPF:) [ 1052.741444][ T3294] BPF: [ 1052.744204][ T3294] BPF:Invalid arg#1 [ 1052.748060][ T3294] BPF: [ 1052.748060][ T3294] [ 1052.769926][ T3298] BPF:Invalid string section 01:12:10 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x60}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:10 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x24}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1052.790781][ T3304] hfsplus: gid requires an argument [ 1052.795999][ T3304] hfsplus: unable to parse mount options 01:12:10 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x20000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1053.012062][ T3322] BPF:Invalid string section [ 1053.028732][ T3323] hfsplus: gid requires an argument [ 1053.033959][ T3323] hfsplus: unable to parse mount options [ 1053.052777][ T3324] BPF:Invalid string section [ 1053.056477][ T3329] BPF:[1] FUNC_PROTO (anon) [ 1053.062735][ T3329] BPF:return=0 args=( [ 1053.066725][ T3329] BPF:536870912 [ 1053.071615][ T3329] BPF:, vararg [ 1053.074995][ T3329] BPF:) [ 1053.082653][ T3329] BPF: [ 1053.085430][ T3329] BPF:Invalid arg#1 [ 1053.090404][ T3329] BPF: [ 1053.090404][ T3329] [ 1053.090933][ T3337] BPF:[1] FUNC_PROTO (anon) [ 1053.102567][ T3337] BPF:return=0 args=( [ 1053.106564][ T3337] BPF:0 (invalid-name-offset) 01:12:10 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x68}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1053.111278][ T3337] BPF:, 0 [ 1053.114301][ T3337] BPF:, vararg [ 1053.117702][ T3337] BPF:) [ 1053.120465][ T3337] BPF: [ 1053.123225][ T3337] BPF:Invalid arg#1 [ 1053.127028][ T3337] BPF: [ 1053.127028][ T3337] [ 1053.135071][ T3336] BPF:[1] FUNC_PROTO (anon) [ 1053.140781][ T3336] BPF:return=0 args=( [ 1053.145065][ T3336] BPF:536870912 [ 1053.149683][ T3336] BPF:, vararg [ 1053.153060][ T3336] BPF:) [ 1053.155816][ T3336] BPF: [ 1053.160044][ T3336] BPF:Invalid arg#1 [ 1053.163510][ T3338] BPF:[1] FUNC_PROTO (anon) [ 1053.163853][ T3336] BPF: [ 1053.163853][ T3336] [ 1053.176200][ T3338] BPF:return=0 args=( [ 1053.181380][ T3338] BPF:0 (invalid-name-offset) [ 1053.186063][ T3338] BPF:, 0 [ 1053.190348][ T3338] BPF:, vararg [ 1053.193723][ T3338] BPF:) [ 1053.196676][ T3338] BPF: [ 1053.200712][ T3338] BPF:Invalid arg#1 [ 1053.204534][ T3338] BPF: [ 1053.204534][ T3338] 01:12:10 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x2e000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}], [], 0x3}) 01:12:10 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x6c}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1053.324065][ T3351] BPF:Invalid string section [ 1053.336892][ T3352] BPF:Invalid string section [ 1053.344555][ T3346] device vlan1270 entered promiscuous mode 01:12:11 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x26}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1053.525072][ T3364] BPF:[1] FUNC_PROTO (anon) [ 1053.531034][ T3364] BPF:return=0 args=( [ 1053.535028][ T3364] BPF:771751936 [ 1053.539711][ T3364] BPF:, vararg [ 1053.543099][ T3364] BPF:) [ 1053.545866][ T3364] BPF: [ 1053.549796][ T3364] BPF:Invalid arg#1 [ 1053.553608][ T3364] BPF: [ 1053.553608][ T3364] [ 1053.579839][ T3366] BPF:[1] FUNC_PROTO (anon) [ 1053.584526][ T3366] BPF:return=0 args=( [ 1053.589903][ T3366] BPF:771751936 [ 1053.593464][ T3366] BPF:, vararg [ 1053.596841][ T3366] BPF:) [ 1053.600944][ T3366] BPF: [ 1053.603717][ T3366] BPF:Invalid arg#1 [ 1053.609106][ T3366] BPF: [ 1053.609106][ T3366] [ 1053.623531][ T3370] BPF:Invalid string section 01:12:11 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x74}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1053.640216][ T3372] BPF:Invalid string section 01:12:11 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x48000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1053.703586][ T3376] hfsplus: gid requires an argument [ 1053.710524][ T3376] hfsplus: unable to parse mount options [ 1053.806758][ T3385] hfsplus: gid requires an argument [ 1053.813534][ T3385] hfsplus: unable to parse mount options [ 1054.042187][ T1228] ieee802154 phy0 wpan0: encryption failed: -22 [ 1054.048570][ T1228] ieee802154 phy1 wpan1: encryption failed: -22 01:12:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x2, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}], [], 0x4}) [ 1054.233164][ T3397] BPF:Invalid string section [ 1054.246714][ T3398] BPF:[1] FUNC_PROTO (anon) [ 1054.249510][ T3402] BPF:Invalid string section [ 1054.252518][ T3398] BPF:return=0 args=( [ 1054.261026][ T3398] BPF:1207959552 [ 1054.264662][ T3398] BPF:, vararg [ 1054.269352][ T3398] BPF:) [ 1054.272126][ T3398] BPF: [ 1054.274888][ T3398] BPF:Invalid arg#1 [ 1054.280125][ T3398] BPF: [ 1054.280125][ T3398] [ 1054.292501][ T3403] BPF:[1] FUNC_PROTO (anon) [ 1054.297150][ T3403] BPF:return=0 args=( [ 1054.303582][ T3403] BPF:1207959552 [ 1054.307229][ T3403] BPF:, vararg [ 1054.310754][ T3403] BPF:) [ 1054.313510][ T3403] BPF: [ 1054.316270][ T3403] BPF:Invalid arg#1 [ 1054.321883][ T3403] BPF: [ 1054.321883][ T3403] [ 1054.323399][ T3408] BPF:[1] FUNC_PROTO (anon) 01:12:11 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x7a}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1054.332540][ T3408] BPF:return=0 args=( [ 1054.336521][ T3408] BPF:0 (invalid-name-offset) [ 1054.342129][ T3408] BPF:, 0 [ 1054.345160][ T3408] BPF:, vararg [ 1054.349702][ T3408] BPF:) [ 1054.352470][ T3408] BPF: [ 1054.355229][ T3408] BPF:Invalid arg#1 [ 1054.360281][ T3408] BPF: [ 1054.360281][ T3408] 01:12:11 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x4c000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1054.391638][ T3409] BPF:[1] FUNC_PROTO (anon) [ 1054.396302][ T3409] BPF:return=0 args=( [ 1054.401499][ T3409] BPF:0 (invalid-name-offset) [ 1054.406187][ T3409] BPF:, 0 [ 1054.410309][ T3409] BPF:, vararg [ 1054.413688][ T3409] BPF:) [ 1054.416449][ T3409] BPF: [ 1054.420146][ T3409] BPF:Invalid arg#1 [ 1054.423954][ T3409] BPF: [ 1054.423954][ T3409] 01:12:12 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x48}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:14 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000200), 0x8801, 0x0) ioctl$AUTOFS_IOC_FAIL(r3, 0x9361, 0x8) r4 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r4, 0xc06864b8, &(0x7f0000000580)={0x0, 0x6, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(r4, 0xc01864cb, &(0x7f00000001c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x3, 0x1}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r5}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1059.210533][ T3430] BPF:[1] FUNC_PROTO (anon) [ 1059.215210][ T3430] BPF:return=0 args=( [ 1059.220398][ T3430] BPF:0 (invalid-name-offset) [ 1059.225088][ T3430] BPF:, 0 [ 1059.229342][ T3430] BPF:, vararg [ 1059.232718][ T3430] BPF:) [ 1059.235484][ T3430] BPF: [ 1059.239935][ T3430] BPF:Invalid arg#1 [ 1059.243761][ T3430] BPF: [ 1059.243761][ T3430] [ 1059.245788][ T3436] BPF:[1] FUNC_PROTO (anon) [ 1059.254389][ T3436] BPF:return=0 args=( [ 1059.259465][ T3436] BPF:1275068416 [ 1059.263145][ T3436] BPF:, vararg [ 1059.266524][ T3436] BPF:) [ 1059.270581][ T3436] BPF: [ 1059.273364][ T3436] BPF:Invalid arg#1 [ 1059.278337][ T3436] BPF: [ 1059.278337][ T3436] [ 1059.291595][ T3432] BPF:[1] FUNC_PROTO (anon) [ 1059.296240][ T3432] BPF:return=0 args=( [ 1059.299972][ T3437] BPF:[1] FUNC_PROTO (anon) [ 1059.302353][ T3432] BPF:0 (invalid-name-offset) [ 1059.304845][ T3437] BPF:return=0 args=( [ 1059.309547][ T3432] BPF:, 0 [ 1059.309558][ T3432] BPF:, vararg [ 1059.309566][ T3432] BPF:) [ 1059.309575][ T3432] BPF: [ 1059.309584][ T3432] BPF:Invalid arg#1 [ 1059.309593][ T3432] BPF: [ 1059.309593][ T3432] [ 1059.323105][ T3443] BPF:Invalid string section [ 1059.325950][ T3437] BPF:1275068416 [ 1059.325962][ T3437] BPF:, vararg [ 1059.325969][ T3437] BPF:) [ 1059.325978][ T3437] BPF: [ 1059.325987][ T3437] BPF:Invalid arg#1 [ 1059.325997][ T3437] BPF: [ 1059.325997][ T3437] [ 1059.424216][ T3448] hfsplus: gid requires an argument [ 1059.430720][ T3448] hfsplus: unable to parse mount options 01:12:17 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x5f000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:17 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4c}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:17 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0xd2}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x3, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}], [], 0x5}) [ 1059.822822][ T3463] BPF:Invalid string section [ 1059.836255][ T3467] BPF:[1] FUNC_PROTO (anon) [ 1059.842157][ T3467] BPF:return=0 args=( [ 1059.846154][ T3467] BPF:0 (invalid-name-offset) [ 1059.852316][ T3467] BPF:, 0 [ 1059.855359][ T3467] BPF:, vararg [ 1059.858772][ T3467] BPF:) [ 1059.861540][ T3467] BPF: [ 1059.863311][ T3469] BPF:[1] FUNC_PROTO (anon) [ 1059.864314][ T3467] BPF:Invalid arg#1 [ 1059.864326][ T3467] BPF: [ 1059.864326][ T3467] [ 1059.878970][ T3469] BPF:return=0 args=( [ 1059.879006][ T3468] BPF:Invalid string section [ 1059.882953][ T3469] BPF:1593835520 [ 1059.882965][ T3469] BPF:, vararg [ 1059.882974][ T3469] BPF:) [ 1059.882983][ T3469] BPF: [ 1059.882993][ T3469] BPF:Invalid arg#1 [ 1059.883003][ T3469] BPF: [ 1059.883003][ T3469] [ 1059.895453][ T3474] BPF:[1] FUNC_PROTO (anon) [ 1059.913033][ T3471] BPF:[1] FUNC_PROTO (anon) [ 1059.913724][ T3474] BPF:return=0 args=( [ 1059.913737][ T3474] BPF:1593835520 [ 1059.913747][ T3474] BPF:, vararg [ 1059.913755][ T3474] BPF:) [ 1059.919378][ T3471] BPF:return=0 args=( [ 1059.919393][ T3471] BPF:0 (invalid-name-offset) [ 1059.919404][ T3471] BPF:, 0 [ 1059.919413][ T3471] BPF:, vararg [ 1059.919422][ T3471] BPF:) [ 1059.919430][ T3471] BPF: [ 1059.919439][ T3471] BPF:Invalid arg#1 [ 1059.919448][ T3471] BPF: [ 1059.919448][ T3471] 01:12:17 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1059.971808][ T3474] BPF: [ 1059.974605][ T3474] BPF:Invalid arg#1 [ 1059.978498][ T3474] BPF: [ 1059.978498][ T3474] 01:12:17 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x60000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:17 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x60}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1060.064145][ T3482] device vlan1271 entered promiscuous mode 01:12:17 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x40, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00464b4, &(0x7f0000000280)={r2}) ioctl$DRM_IOCTL_MODE_ADDFB2(r1, 0xc06864b8, &(0x7f00000001c0)={0x200, 0x80000000, 0x5, 0x4, 0x2, [0x0, 0x10001, 0x20, 0x9], [0x8001, 0xffffffff, 0x10000, 0x6], [0x4, 0x0, 0x5, 0xa65], [0xffffffffffff0001, 0x6, 0x400, 0x8]}) r4 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r5}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(r6, 0xc0286404, &(0x7f0000000140)={&(0x7f0000ffb000/0x2000)=nil}) [ 1060.120778][ T3493] hfsplus: gid requires an argument [ 1060.126014][ T3493] hfsplus: unable to parse mount options [ 1060.202772][ T3499] BPF:[1] FUNC_PROTO (anon) [ 1060.214009][ T3499] BPF:return=0 args=( [ 1060.218091][ T3499] BPF:0 (anon) [ 1060.221472][ T3499] BPF:, 2 [ 1060.224500][ T3499] BPF:) [ 1060.227315][ T3499] BPF: [ 1060.230080][ T3499] BPF:Invalid arg#1 [ 1060.233889][ T3499] BPF: [ 1060.233889][ T3499] [ 1060.251620][ T3500] BPF:[1] FUNC_PROTO (anon) [ 1060.256293][ T3500] BPF:return=0 args=( [ 1060.262685][ T3500] BPF:0 (anon) [ 1060.263777][ T3502] BPF:[1] FUNC_PROTO (anon) [ 1060.266069][ T3500] BPF:, 2 [ 1060.266079][ T3500] BPF:) [ 1060.266088][ T3500] BPF: [ 1060.266097][ T3500] BPF:Invalid arg#1 [ 1060.266106][ T3500] BPF: [ 1060.266106][ T3500] [ 1060.291360][ T3502] BPF:return=0 args=( [ 1060.295353][ T3502] BPF:0 (invalid-name-offset) 01:12:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x4, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1060.301230][ T3502] BPF:, 0 [ 1060.304263][ T3502] BPF:, vararg [ 1060.308949][ T3502] BPF:) [ 1060.311719][ T3502] BPF: [ 1060.314518][ T3502] BPF:Invalid arg#1 [ 1060.319389][ T3502] BPF: [ 1060.319389][ T3502] [ 1060.355637][ T3505] BPF:[1] FUNC_PROTO (anon) [ 1060.365662][ T3505] BPF:return=0 args=( [ 1060.369750][ T3505] BPF:0 (invalid-name-offset) [ 1060.374433][ T3505] BPF:, 0 [ 1060.377527][ T3505] BPF:, vararg [ 1060.380902][ T3505] BPF:) [ 1060.381681][ T3511] hfsplus: gid requires an argument [ 1060.383652][ T3505] BPF: [ 1060.388883][ T3511] hfsplus: unable to parse mount options [ 1060.397327][ T3505] BPF:Invalid arg#1 [ 1060.401134][ T3505] BPF: [ 1060.401134][ T3505] [ 1060.420236][ T3519] BPF:[1] FUNC_PROTO (anon) [ 1060.424896][ T3519] BPF:return=0 args=( [ 1060.430244][ T3519] BPF:1610612736 [ 1060.433887][ T3519] BPF:, vararg [ 1060.438794][ T3519] BPF:) [ 1060.441567][ T3519] BPF: [ 1060.444329][ T3519] BPF:Invalid arg#1 [ 1060.449162][ T3519] BPF: [ 1060.449162][ T3519] 01:12:18 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x0, [], 0x2}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}], [], 0x6}) 01:12:18 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x68000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:18 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000000)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f00000001c0)={0x7fff, 0x7, 0x4d9d, 0x1ff, 0x2, [0x0, 0x9, 0x1, 0xdb13], [0x9, 0x0, 0x400, 0x1], [0xd3, 0x6, 0x101, 0x2e], [0x8, 0xff, 0x6, 0x6]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:12:18 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x68}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1060.720589][ T3531] device vlan1272 entered promiscuous mode [ 1060.745574][ T3537] BPF:Invalid string section 01:12:18 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x0, [], 0x3}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1060.768559][ T3545] BPF:Invalid string section [ 1060.869013][ T3554] BPF:[1] FUNC_PROTO (anon) [ 1060.873698][ T3554] BPF:return=0 args=( [ 1060.879185][ T3554] BPF:1744830464 [ 1060.882417][ T3553] hfsplus: gid requires an argument [ 1060.882829][ T3554] BPF:, vararg [ 1060.889222][ T3553] hfsplus: unable to parse mount options [ 1060.891503][ T3554] BPF:) [ 1060.899916][ T3554] BPF: [ 1060.902679][ T3554] BPF:Invalid arg#1 [ 1060.906484][ T3554] BPF: [ 1060.906484][ T3554] 01:12:18 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000000)={r1}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000300)={r4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1060.935746][ T3556] BPF:[1] FUNC_PROTO (anon) [ 1060.941827][ T3556] BPF:return=0 args=( [ 1060.945815][ T3556] BPF:1744830464 [ 1060.950771][ T3556] BPF:, vararg [ 1060.954148][ T3556] BPF:) [ 1060.958033][ T3556] BPF: [ 1060.960803][ T3556] BPF:Invalid arg#1 [ 1060.964606][ T3556] BPF: [ 1060.964606][ T3556] [ 1060.988999][ T3567] BPF:[1] FUNC_PROTO (anon) [ 1060.993689][ T3567] BPF:return=0 args=( [ 1060.999129][ T3567] BPF:0 (invalid-name-offset) [ 1061.003907][ T3567] BPF:, 0 [ 1061.007962][ T3567] BPF:, vararg [ 1061.011342][ T3567] BPF:) [ 1061.014115][ T3567] BPF: [ 1061.018063][ T3567] BPF:Invalid arg#1 [ 1061.021881][ T3567] BPF: [ 1061.021881][ T3567] 01:12:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x5, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1061.054544][ T3568] BPF:[1] FUNC_PROTO (anon) [ 1061.060525][ T3568] BPF:return=0 args=( [ 1061.064519][ T3568] BPF:0 (invalid-name-offset) [ 1061.070308][ T3568] BPF:, 0 [ 1061.073334][ T3568] BPF:, vararg [ 1061.078131][ T3568] BPF:) [ 1061.081273][ T3568] BPF: [ 1061.084037][ T3568] BPF:Invalid arg#1 [ 1061.089190][ T3568] BPF: [ 1061.089190][ T3568] 01:12:18 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x0, [], 0x4}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1061.149897][ T3574] BPF:Invalid string section [ 1061.151280][ T3575] hfsplus: gid requires an argument [ 1061.161246][ T3575] hfsplus: unable to parse mount options [ 1061.163801][ T3576] BPF:Invalid string section 01:12:18 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x6c000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:18 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x6c}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1061.401648][ T3592] BPF:Invalid string section 01:12:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}], [], 0x7}) 01:12:18 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x0, [], 0x5}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1061.432203][ T3593] BPF:Invalid string section [ 1061.493294][ T3595] device vlan1273 entered promiscuous mode 01:12:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x6, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1064.484539][ T3621] BPF:[1] FUNC_PROTO (anon) [ 1064.490283][ T3621] BPF:return=0 args=( [ 1064.492053][ T3620] BPF:[1] FUNC_PROTO (anon) [ 1064.494275][ T3621] BPF:1811939328 [ 1064.494289][ T3621] BPF:, vararg [ 1064.494299][ T3621] BPF:) [ 1064.494308][ T3621] BPF: [ 1064.494318][ T3621] BPF:Invalid arg#1 [ 1064.494328][ T3621] BPF: [ 1064.494328][ T3621] [ 1064.500074][ T3620] BPF:return=0 args=( [ 1064.530653][ T3620] BPF:0 (invalid-name-offset) [ 1064.535344][ T3620] BPF:, 0 [ 1064.538480][ T3620] BPF:, vararg [ 1064.541857][ T3620] BPF:) [ 1064.544629][ T3620] BPF: [ 1064.546069][ T3622] BPF:[1] FUNC_PROTO (anon) [ 1064.547455][ T3620] BPF:Invalid arg#1 [ 1064.547468][ T3620] BPF: [ 1064.547468][ T3620] [ 1064.562598][ T3625] BPF:[1] FUNC_PROTO (anon) [ 1064.564445][ T3622] BPF:return=0 args=( [ 1064.570048][ T3625] BPF:return=0 args=( [ 1064.572970][ T3622] BPF:1811939328 [ 1064.577832][ T3625] BPF:0 (invalid-name-offset) [ 1064.580585][ T3622] BPF:, vararg [ 1064.585264][ T3625] BPF:, 0 [ 1064.588677][ T3622] BPF:) [ 1064.588688][ T3622] BPF: [ 1064.588698][ T3622] BPF:Invalid arg#1 [ 1064.588707][ T3622] BPF: [ 1064.588707][ T3622] [ 1064.609198][ T3625] BPF:, vararg [ 1064.612579][ T3625] BPF:) [ 1064.615339][ T3625] BPF: [ 1064.619295][ T3625] BPF:Invalid arg#1 [ 1064.623107][ T3625] BPF: [ 1064.623107][ T3625] 01:12:22 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x0, [], 0x6}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:22 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x74000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1064.644335][ T3624] hfsplus: unable to parse mount options [ 1064.652746][ T3628] BPF:Invalid string section [ 1064.747718][ T3627] hfsplus: unable to parse mount options [ 1064.781431][ T3638] device vlan1274 entered promiscuous mode 01:12:22 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x74}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:23 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r2 = syz_open_dev$dri(&(0x7f0000000180), 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) r4 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r4, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r4, 0xc02064c3, &(0x7f0000000140)={&(0x7f0000000000)=[0x0], 0x3, 0x1, 0x2}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:12:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x7, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}], [], 0x8}) [ 1066.415365][ T3659] BPF:[1] FUNC_PROTO (anon) [ 1066.421364][ T3659] BPF:return=0 args=( [ 1066.425362][ T3659] BPF:1946157056 [ 1066.430196][ T3659] BPF:, vararg [ 1066.433580][ T3659] BPF:) [ 1066.441353][ T3659] BPF: [ 1066.444133][ T3659] BPF:Invalid arg#1 [ 1066.449042][ T3659] BPF: [ 1066.449042][ T3659] 01:12:24 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x0, [], 0x7}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:24 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00464b4, &(0x7f0000000000)={r2}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1066.474339][ T3663] BPF:[1] FUNC_PROTO (anon) [ 1066.480203][ T3663] BPF:return=0 args=( [ 1066.483899][ T3661] BPF:Invalid string section [ 1066.484193][ T3663] BPF:0 (invalid-name-offset) [ 1066.493671][ T3663] BPF:, 0 [ 1066.498812][ T3663] BPF:, vararg [ 1066.502202][ T3663] BPF:) [ 1066.504984][ T3663] BPF: [ 1066.508646][ T3667] BPF:Invalid string section [ 1066.513613][ T3663] BPF:Invalid arg#1 [ 1066.518825][ T3663] BPF: [ 1066.518825][ T3663] [ 1066.549501][ T3660] BPF:[1] FUNC_PROTO (anon) [ 1066.554165][ T3660] BPF:return=0 args=( [ 1066.559605][ T3660] BPF:1946157056 [ 1066.563244][ T3660] BPF:, vararg [ 1066.568034][ T3660] BPF:) [ 1066.569824][ T3664] BPF:[1] FUNC_PROTO (anon) [ 1066.570801][ T3660] BPF: [ 1066.570812][ T3660] BPF:Invalid arg#1 [ 1066.570821][ T3660] BPF: [ 1066.570821][ T3660] [ 1066.589184][ T3664] BPF:return=0 args=( [ 1066.593175][ T3664] BPF:0 (invalid-name-offset) [ 1066.603309][ T3664] BPF:, 0 [ 1066.606402][ T3664] BPF:, vararg [ 1066.609784][ T3664] BPF:) [ 1066.612547][ T3664] BPF: [ 1066.615310][ T3664] BPF:Invalid arg#1 [ 1066.619172][ T3664] BPF: [ 1066.619172][ T3664] 01:12:24 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x7a000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:24 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x7a}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1067.113148][ T3686] hfsplus: gid requires an argument [ 1067.119708][ T3686] hfsplus: unable to parse mount options [ 1067.138384][ T3694] device vlan1275 entered promiscuous mode [ 1067.151070][ T3693] BPF:Invalid string section [ 1067.165176][ T3698] BPF:Invalid string section [ 1067.176002][ T3699] BPF:[1] FUNC_PROTO (anon) [ 1067.181984][ T3699] BPF:return=0 args=( [ 1067.185980][ T3699] BPF:0 (invalid-name-offset) [ 1067.192128][ T3699] BPF:, 0 [ 1067.195164][ T3699] BPF:, vararg [ 1067.199813][ T3699] BPF:) [ 1067.202590][ T3699] BPF: [ 1067.205351][ T3699] BPF:Invalid arg#1 [ 1067.210241][ T3699] BPF: [ 1067.210241][ T3699] [ 1067.220651][ T3697] BPF:[1] FUNC_PROTO (anon) [ 1067.225654][ T3697] BPF:return=0 args=( [ 1067.231079][ T3697] BPF:2046820352 [ 1067.234722][ T3697] BPF:, vararg [ 1067.238154][ T3697] BPF:) [ 1067.240919][ T3697] BPF: [ 1067.243682][ T3697] BPF:Invalid arg#1 [ 1067.247559][ T3697] BPF: [ 1067.247559][ T3697] [ 1067.258406][ T3702] BPF:[1] FUNC_PROTO (anon) [ 1067.263068][ T3702] BPF:return=0 args=( 01:12:24 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x0, [], 0x8}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1067.268104][ T3702] BPF:0 (invalid-name-offset) [ 1067.272819][ T3702] BPF:, 0 [ 1067.275848][ T3702] BPF:, vararg [ 1067.280337][ T3702] BPF:) [ 1067.283104][ T3702] BPF: [ 1067.285864][ T3702] BPF:Invalid arg#1 [ 1067.290621][ T3702] BPF: [ 1067.290621][ T3702] [ 1067.307152][ T3703] BPF:[1] FUNC_PROTO (anon) [ 1067.311807][ T3703] BPF:return=0 args=( [ 1067.315796][ T3703] BPF:2046820352 01:12:24 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0xd2000000}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1067.321863][ T3703] BPF:, vararg [ 1067.325243][ T3703] BPF:) [ 1067.329519][ T3703] BPF: [ 1067.332292][ T3703] BPF:Invalid arg#1 [ 1067.337400][ T3703] BPF: [ 1067.337400][ T3703] 01:12:24 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xd2}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:25 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x2, 0x5a1200) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:12:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x8, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}], [], 0x9}) [ 1067.630360][ T3718] BPF:Invalid string section [ 1067.645024][ T3720] BPF:Invalid string section [ 1067.684432][ T3724] BPF:[1] FUNC_PROTO (anon) [ 1067.691276][ T3724] BPF:return=0 args=( [ 1067.695314][ T3724] BPF:3523215360 [ 1067.700116][ T3724] BPF:, vararg [ 1067.703500][ T3724] BPF:) [ 1067.707650][ T3724] BPF: [ 1067.710421][ T3724] BPF:Invalid arg#1 [ 1067.714238][ T3724] BPF: [ 1067.714238][ T3724] [ 1067.728985][ T3726] BPF:[1] FUNC_PROTO (anon) 01:12:25 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x0, [], 0xa}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:25 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0xffff0f00}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:25 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x300}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1067.733643][ T3726] BPF:return=0 args=( [ 1067.738904][ T3726] BPF:0 (invalid-name-offset) [ 1067.743593][ T3726] BPF:, 0 [ 1067.747987][ T3726] BPF:, vararg [ 1067.751368][ T3726] BPF:) [ 1067.754131][ T3726] BPF: [ 1067.756929][ T3726] BPF:Invalid arg#1 [ 1067.760736][ T3726] BPF: [ 1067.760736][ T3726] [ 1068.010073][ T3740] hfsplus: gid requires an argument [ 1068.015302][ T3740] hfsplus: unable to parse mount options [ 1068.053325][ T3754] BPF:[1] FUNC_PROTO (anon) [ 1068.059221][ T3754] BPF:return=0 args=( [ 1068.060844][ T3757] BPF:Invalid string section [ 1068.063317][ T3754] BPF:0 (invalid-name-offset) [ 1068.063332][ T3754] BPF:, 0 [ 1068.063342][ T3754] BPF:, vararg [ 1068.063352][ T3754] BPF:) [ 1068.063361][ T3754] BPF: [ 1068.084646][ T3758] device vlan1276 entered promiscuous mode [ 1068.086048][ T3754] BPF:Invalid arg#1 [ 1068.086061][ T3754] BPF: [ 1068.086061][ T3754] [ 1068.111110][ T3756] BPF:[1] FUNC_PROTO (anon) [ 1068.112094][ T3755] BPF:[1] FUNC_PROTO (anon) [ 1068.115775][ T3756] BPF:return=0 args=( [ 1068.121717][ T3755] BPF:return=0 args=( [ 1068.121733][ T3755] BPF:4294905600 [ 1068.121744][ T3755] BPF:, vararg [ 1068.121754][ T3755] BPF:) [ 1068.121763][ T3755] BPF: [ 1068.121773][ T3755] BPF:Invalid arg#1 [ 1068.121783][ T3755] BPF: [ 1068.121783][ T3755] [ 1068.141326][ T3764] BPF:[1] FUNC_PROTO (anon) [ 1068.142630][ T3756] BPF:0 (invalid-name-offset) [ 1068.142644][ T3756] BPF:, 0 [ 1068.142653][ T3756] BPF:, vararg [ 1068.142662][ T3756] BPF:) [ 1068.142671][ T3756] BPF: [ 1068.142680][ T3756] BPF:Invalid arg#1 [ 1068.145809][ T3764] BPF:return=0 args=( [ 1068.149548][ T3756] BPF: [ 1068.149548][ T3756] [ 1068.189398][ T3764] BPF:4294905600 [ 1068.193032][ T3764] BPF:, vararg [ 1068.196463][ T3764] BPF:) [ 1068.199223][ T3764] BPF: 01:12:25 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x7, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1068.201984][ T3764] BPF:Invalid arg#1 [ 1068.205870][ T3764] BPF: [ 1068.205870][ T3764] 01:12:25 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x0, [], 0x11}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:25 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0xffffff00}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}], [], 0x10}) 01:12:25 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x500}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x9, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:26 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x0, [], 0x1c}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1068.482862][ T3785] BPF:Invalid string section [ 1068.493012][ T3787] BPF:[1] FUNC_PROTO (anon) [ 1068.498763][ T3787] BPF:return=0 args=( [ 1068.502758][ T3787] BPF:4294967040 [ 1068.507860][ T3787] BPF:, vararg [ 1068.511243][ T3787] BPF:) [ 1068.514010][ T3787] BPF: [ 1068.516825][ T3787] BPF:Invalid arg#1 [ 1068.520629][ T3787] BPF: [ 1068.520629][ T3787] 01:12:26 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) r4 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r4, 0xc00c642d, &(0x7f0000000100)={r5}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000000)={r5}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1068.549231][ T3789] BPF:[1] FUNC_PROTO (anon) [ 1068.553851][ T3789] BPF:return=0 args=( [ 1068.559702][ T3789] BPF:4294967040 [ 1068.563352][ T3789] BPF:, vararg [ 1068.568160][ T3789] BPF:) [ 1068.570932][ T3789] BPF: [ 1068.573694][ T3789] BPF:Invalid arg#1 [ 1068.577547][ T3789] BPF: [ 1068.577547][ T3789] [ 1068.650061][ T3797] BPF:[1] FUNC_PROTO (anon) [ 1068.654719][ T3797] BPF:return=0 args=( [ 1068.660229][ T3797] BPF:0 (invalid-name-offset) [ 1068.664919][ T3797] BPF:, 0 [ 1068.669248][ T3797] BPF:, vararg [ 1068.672630][ T3797] BPF:) [ 1068.675392][ T3797] BPF: [ 1068.678209][ T3797] BPF:Invalid arg#1 [ 1068.682008][ T3797] BPF: [ 1068.682008][ T3797] 01:12:26 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1068.715386][ T3802] hfsplus: gid requires an argument [ 1068.721905][ T3802] hfsplus: unable to parse mount options [ 1068.754119][ T3811] BPF:Invalid string section [ 1068.760991][ T3814] BPF:Invalid string section 01:12:26 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x0, [], 0x1e}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1068.822310][ T3803] device vlan1277 entered promiscuous mode 01:12:26 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x600}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:26 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000000)={0x2, 0x2, 0x80000000}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r1, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000200)={0x1, 0x4e88, 0xffffffff, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r1, 0xc01064b3, &(0x7f0000000240)={r2}) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00464b4, &(0x7f0000000300)={r5}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000001c0)={0x0, 0x0, r0}) signalfd4(r0, &(0x7f0000000140)={[0x9]}, 0x8, 0x80000) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:12:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0xa, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1068.987780][ T3832] BPF:Invalid string section 01:12:26 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x0, [], 0x48}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1069.019680][ T3833] BPF:Invalid string section [ 1069.028543][ T3835] BPF:[1] FUNC_PROTO (anon) [ 1069.033209][ T3835] BPF:return=0 args=( [ 1069.039398][ T3835] BPF:0 [ 1069.042270][ T3835] BPF:, vararg [ 1069.045639][ T3835] BPF:) [ 1069.049430][ T3835] BPF: [ 1069.052202][ T3835] BPF:Invalid arg#1 [ 1069.057209][ T3835] BPF: [ 1069.057209][ T3835] 01:12:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}], [], 0x48}) [ 1069.070740][ T3839] BPF:[1] FUNC_PROTO (anon) [ 1069.075345][ T3839] BPF:return=0 args=( [ 1069.080593][ T3839] BPF:0 [ 1069.083447][ T3839] BPF:, vararg [ 1069.087930][ T3839] BPF:) [ 1069.090693][ T3839] BPF: [ 1069.093454][ T3839] BPF:Invalid arg#1 [ 1069.098246][ T3839] BPF: [ 1069.098246][ T3839] [ 1069.253996][ T3847] device vlan1278 entered promiscuous mode [ 1069.262161][ T3857] BPF:Invalid string section [ 1069.282321][ T3859] BPF:[1] FUNC_PROTO (anon) [ 1069.283549][ T3860] BPF:Invalid string section [ 1069.289337][ T3859] BPF:return=0 args=( [ 1069.297855][ T3859] BPF:0 (invalid-name-offset) 01:12:26 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x0, [], 0x4c}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:26 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1069.302543][ T3859] BPF:, 0 [ 1069.305569][ T3859] BPF:, vararg [ 1069.310197][ T3859] BPF:) [ 1069.312978][ T3859] BPF: [ 1069.315745][ T3859] BPF:Invalid arg#1 [ 1069.321675][ T3859] BPF: [ 1069.321675][ T3859] [ 1069.339740][ T3863] BPF:[1] FUNC_PROTO (anon) [ 1069.344385][ T3863] BPF:return=0 args=( [ 1069.350833][ T3863] BPF:0 (invalid-name-offset) [ 1069.355515][ T3863] BPF:, 0 [ 1069.359932][ T3863] BPF:, vararg [ 1069.363309][ T3863] BPF:) [ 1069.367312][ T3863] BPF: [ 1069.370079][ T3863] BPF:Invalid arg#1 [ 1069.374064][ T3863] BPF: [ 1069.374064][ T3863] 01:12:26 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) r4 = dup3(r2, r0, 0x80000) clone(0x40012880, &(0x7f00000001c0)="a8e6be523df233b4e25207df7d666fbb1e21c6fa9fcaae426e04f386346d7f003688f83360d73051f214db078a20530f86b0a5097e2e67fb3da4dbdb9a7529ba729354d511c227914184db0886d3c085c418c3490e8954f9a9dc82ab830a2ccbf626d84e419d1646faa8001511416732f8cbd1dcd687f50d5ecfab35734d8a3113f8c774cf71e6efdece48e36e79337ade5476442be253f61374b8962044d382ecb56d8db214f7dfbce0a28ebecaebece5a79ea8d32e8652436ee103aacd48179f878509e5a0b0b987f290a47b939133797dee77563b2139e1f270e3f5fcf10c24e1", &(0x7f0000000140), &(0x7f00000002c0), &(0x7f0000000340)="d644c451be6db44c7fe7d62b91a8ffe0113693614c88232ddd680ee421e93f8343e4a297f8954e4f8f7fcfe05deff545191ad30633f42ed9f822a1a1e58e73fb7051027e213eec9b5221d732b7fde190dcf3860d42a35f8a9aaa76054e8053412a31f4ee766b4f20557e201a3ea68eeaf3") ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r4, 0xc01864b0, &(0x7f0000000000)={0x1, 0x1f, 0x0, 0x72c7, 0x6}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1069.407520][ T3865] hfsplus: gid requires an argument [ 1069.412743][ T3865] hfsplus: unable to parse mount options [ 1069.473543][ T3872] BPF:Invalid string section [ 1069.484501][ T3873] BPF:Invalid string section 01:12:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0xc, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:27 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x0, [], 0x60}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1069.534619][ T3880] hfsplus: gid requires an argument [ 1069.542187][ T3880] hfsplus: unable to parse mount options [ 1069.572766][ T3887] BPF:[1] FUNC_PROTO (anon) [ 1069.578834][ T3887] BPF:return=0 args=( [ 1069.582831][ T3887] BPF:0 [ 1069.585681][ T3887] BPF:, vararg [ 1069.589134][ T3887] BPF:) [ 1069.591900][ T3887] BPF: [ 1069.594663][ T3887] BPF:Invalid arg#2 [ 1069.598550][ T3887] BPF: [ 1069.598550][ T3887] [ 1069.609456][ T3889] BPF:[1] FUNC_PROTO (anon) [ 1069.614112][ T3889] BPF:return=0 args=( [ 1069.619453][ T3889] BPF:0 [ 1069.622305][ T3889] BPF:, vararg [ 1069.625676][ T3889] BPF:) [ 1069.629559][ T3889] BPF: 01:12:27 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x700}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:27 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x3}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1069.632332][ T3889] BPF:Invalid arg#2 [ 1069.637584][ T3889] BPF: [ 1069.637584][ T3889] 01:12:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}], [], 0x4c}) [ 1069.757712][ T3900] BPF:[1] FUNC_PROTO (anon) [ 1069.762375][ T3900] BPF:return=0 args=( [ 1069.767772][ T3900] BPF:0 [ 1069.770634][ T3900] BPF:, vararg [ 1069.774026][ T3900] BPF:) [ 1069.776847][ T3900] BPF: [ 1069.779614][ T3900] BPF:Invalid arg#2 [ 1069.783435][ T3900] BPF: [ 1069.783435][ T3900] [ 1069.798618][ T3904] BPF:[1] FUNC_PROTO (anon) [ 1069.803273][ T3904] BPF:return=0 args=( [ 1069.808649][ T3904] BPF:0 [ 1069.811509][ T3904] BPF:, vararg [ 1069.814872][ T3904] BPF:) [ 1069.819056][ T3904] BPF: [ 1069.821829][ T3904] BPF:Invalid arg#2 [ 1069.821925][ T3903] BPF:Invalid string section [ 1069.825686][ T3904] BPF: [ 1069.825686][ T3904] [ 1069.844848][ T3912] BPF:Invalid string section [ 1069.852018][ T3913] device vlan1279 entered promiscuous mode [ 1069.899753][ T3920] BPF:[1] FUNC_PROTO (anon) [ 1069.904404][ T3920] BPF:return=0 args=( [ 1069.909580][ T3920] BPF:0 (invalid-name-offset) [ 1069.914268][ T3920] BPF:, 0 [ 1069.918182][ T3920] BPF:, vararg [ 1069.921568][ T3920] BPF:) [ 1069.924336][ T3920] BPF: [ 1069.928420][ T3920] BPF:Invalid arg#1 [ 1069.932238][ T3920] BPF: [ 1069.932238][ T3920] 01:12:27 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x0, [], 0x68}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:27 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00c642d, &(0x7f0000000100)={r4}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000340)={r4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000002c0)={0x7fffffff, 0x3ff, 0x7f, 0x31, &(0x7f0000000000)=""/49, 0xe9, &(0x7f00000001c0)=""/233, 0x16, &(0x7f0000000140)=""/22}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r6}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1069.966765][ T3921] BPF:[1] FUNC_PROTO (anon) [ 1069.971415][ T3921] BPF:return=0 args=( [ 1069.975400][ T3921] BPF:0 (invalid-name-offset) [ 1069.982317][ T3921] BPF:, 0 [ 1069.985357][ T3921] BPF:, vararg [ 1069.990342][ T3921] BPF:) [ 1069.993112][ T3921] BPF: [ 1069.997671][ T3921] BPF:Invalid arg#1 [ 1070.001488][ T3921] BPF: [ 1070.001488][ T3921] 01:12:27 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x4}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0xe, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:27 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f00000001c0)={0x10000, 0x6, 0x4, 0x5, 0x1, [0x1f, 0xf3, 0x5, 0x4], [0x200, 0x230000, 0x8d9b, 0x2], [0x8, 0xfffffe00, 0x399d, 0x6526], [0x2, 0x6, 0x2, 0x2]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000000)={0x5, 0xfff, 0xc0000d7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000380)={0x200, 0x4, 0x201e58b5, 0x81, 0x1, [0x7, 0x5, 0x6, 0x3], [0x100, 0x4c, 0x7, 0xc5], [0x7, 0x7, 0x8, 0x9], [0x44bb, 0x6, 0x800]}) r4 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_ATOMIC(r5, 0xc03864bc, &(0x7f0000000340)={0x400, 0x6, &(0x7f0000000140)=[0x0, 0x8001, 0x53, 0x9, 0x30, 0x7f], &(0x7f0000000240)=[0x90000, 0x8000, 0x9, 0x80, 0x6, 0x5, 0x9, 0x5], &(0x7f0000000280)=[0x7ff, 0x2, 0x1, 0x10001, 0x5, 0x7fff, 0xfffffff8, 0x4, 0x8, 0xcec9], &(0x7f00000002c0)=[0x52, 0x9, 0xfffffffd], 0x0, 0x3}) ioctl$DRM_IOCTL_MODE_ADDFB2(r4, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x1, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:12:27 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x0, [], 0x6c}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:27 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xa00}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1070.120839][ T3931] hfsplus: gid requires an argument [ 1070.127326][ T3931] hfsplus: unable to parse mount options [ 1070.153505][ T3937] BPF:Invalid string section [ 1070.265742][ T3943] BPF:[1] FUNC_PROTO (anon) [ 1070.271748][ T3943] BPF:return=0 args=( [ 1070.275737][ T3943] BPF:0 [ 1070.279956][ T3943] BPF:, vararg [ 1070.283332][ T3943] BPF:) [ 1070.287175][ T3943] BPF: [ 1070.289948][ T3943] BPF:Invalid arg#2 [ 1070.293757][ T3943] BPF: [ 1070.293757][ T3943] [ 1070.329858][ T3953] BPF:[1] FUNC_PROTO (anon) [ 1070.334535][ T3953] BPF:return=0 args=( [ 1070.340026][ T3953] BPF:0 (invalid-name-offset) [ 1070.343308][ T3949] hfsplus: gid requires an argument [ 1070.344713][ T3953] BPF:, 0 [ 1070.351280][ T3949] hfsplus: unable to parse mount options [ 1070.352972][ T3953] BPF:, vararg [ 1070.361990][ T3953] BPF:) [ 1070.364758][ T3953] BPF: [ 1070.367569][ T3953] BPF:Invalid arg#1 [ 1070.371373][ T3953] BPF: [ 1070.371373][ T3953] [ 1070.420609][ T3958] BPF:[1] FUNC_PROTO (anon) [ 1070.425284][ T3958] BPF:return=0 args=( [ 1070.431704][ T3958] BPF:0 (invalid-name-offset) [ 1070.436451][ T3958] BPF:, 0 [ 1070.439475][ T3958] BPF:, vararg [ 1070.442880][ T3958] BPF:) [ 1070.445642][ T3958] BPF: [ 1070.448472][ T3958] BPF:Invalid arg#1 [ 1070.452275][ T3958] BPF: [ 1070.452275][ T3958] 01:12:28 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x0, [], 0x74}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1070.469229][ T3964] BPF:Invalid string section [ 1070.488403][ T3967] device vlan1280 entered promiscuous mode [ 1070.503037][ T3968] BPF:Invalid string section 01:12:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0xf, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:28 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x0, [], 0x7a}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:28 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) r4 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r4, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000001c0)={0x4, 0x0, 0x8001, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r4, 0xc00464b4, &(0x7f0000000200)={r5}) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000140)={0x28, 0x0, 0x2710}, 0x10, 0x800) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000000)='/dev/dri/card#\x00', 0x0, r6) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1070.624467][ T3977] BPF:Invalid string section [ 1070.634179][ T3979] BPF:Invalid string section 01:12:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}], [], 0x60}) 01:12:28 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x5}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:28 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x1100}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1070.765910][ T3989] BPF:Invalid string section [ 1070.784814][ T3994] BPF:[1] FUNC_PROTO (anon) [ 1070.790847][ T3994] BPF:return=0 args=( [ 1070.794845][ T3994] BPF:0 (invalid-name-offset) [ 1070.800878][ T3994] BPF:, 0 [ 1070.803915][ T3994] BPF:, vararg [ 1070.808727][ T3994] BPF:) [ 1070.811505][ T3994] BPF: 01:12:28 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}, {0x0, [], 0xd2}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1070.813675][ T3991] BPF:Invalid string section [ 1070.814268][ T3994] BPF:Invalid arg#1 [ 1070.822780][ T3994] BPF: [ 1070.822780][ T3994] [ 1070.868812][ T3996] BPF:[1] FUNC_PROTO (anon) [ 1070.873491][ T3996] BPF:return=0 args=( [ 1070.878961][ T3996] BPF:0 (invalid-name-offset) [ 1070.883644][ T3996] BPF:, 0 [ 1070.886705][ T3996] BPF:, vararg [ 1070.890079][ T3996] BPF:) [ 1070.892839][ T3996] BPF: [ 1070.895593][ T3996] BPF:Invalid arg#1 [ 1070.897867][ T4010] device vlan1281 entered promiscuous mode [ 1070.899426][ T3996] BPF: [ 1070.899426][ T3996] [ 1070.948203][ T4012] BPF:[1] FUNC_PROTO (anon) [ 1070.952856][ T4012] BPF:return=0 args=( [ 1070.955029][ T4018] hfsplus: gid requires an argument [ 1070.958003][ T4012] BPF:0 [ 1070.958015][ T4012] BPF:, vararg [ 1070.958025][ T4012] BPF:) [ 1070.958035][ T4012] BPF: [ 1070.958045][ T4012] BPF:Invalid arg#2 [ 1070.958062][ T4012] BPF: [ 1070.958062][ T4012] [ 1070.984981][ T4018] hfsplus: unable to parse mount options 01:12:28 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x6}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:28 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x20004000, &(0x7f0000000340)="2655bdf127e124be765a5dc57f7b286a894fb7e956ef69a6a3d341abc2374b556347e3c07df84ef8435d351f1b35a822022aa0e3aca8cf20436ac3b2f2fa3c66de56bdb0c0bc9f2eded8fa0ea700f1c321d4ceb793af1267c0f3a8fa00c666336a281926107b51325833dc43dcea3bdf87404e93bccb6a772eb47ea2d90f38cbd524d217bf7d1d11061409ddc947f831285c37e700b914d8c6c29c5ec658b783fb32897f9995e853c356782f0159861a1a8d1fbaee12d5f63e1c212041758082bfcab2f67601d0f9813a8f99491409893c1568f2ef3443dd19752582f58626cdfb041a9b2faef3328840ef53fdd887edbb3951d1c8fb7c0f6fdd72347a59b5f8c0dcb2d1b554d804b0a7aea03870fce1cded8906d763b0d78296d4c5eac1616ecb77b9b9cfe38f7d133cb0d6be50ac8a3971386838521ee9a28c5e72e213012594a5a3efccfeeff8b4b4a8dc054fe8332fee16f044097cd5e13f514d26d3fbd71e25a29e4fee5578a23effca5e30d05f086d840fcb32cbf72acf0d60b870644620084e607f7e22699347a600b455d6dd129c4cc3040bdf646c98da91a18700c2da6c368d771de5d2fb9b8e0b567e044ef545f3ed974439ec7129d9f82928f24e9d263b184f55cb2e72e0127f3a10a323b2854b7ce91e1a3cd695458a80c4d54d3eeabc17fbad88a023c9ecd4abea1686baead4f0020fd20b87a397ab50143049fc85db5061e58bd1695b8779edc5ccd7bdd40b88f67fce12c25148eb36904c25dbcfb923b412ec747c7c1978aa8d14f2ba5b7ee704456f5c50552359c2cdc60e98a1ed1df533b87b6cb32ee0a8e7ad504091407aa6734c22ee8c7f4c60ebea0f89eddf3ed269c8f2303f05d0c94e3d8426d60ff88db894f84ce3eac102aa8633a7ec2d02081a2a0e5560ef289661936671c1ebfb084e9f66d356f998fbf1bcb534cf4d0d80a339bd3d66a78292924a2197a824c93c8985a6c6a3958ed1bcb16f770f6c0369e877911f4e6db5e365077a8febb9f8e4bacdf9e3f183eb8f73db7948859c0bf907302050df720ed179f5fdaa75d2bcd010854e63c027b22d636e12b944696d85ea62966100d29905d72e4bd61b3fca6237dbc9ed8b7bc8ee6e478ca26fca818ac7794f4c52ea92003f1a883a44c1a957f7ef05eaa2ff0effd05a10f7d5f7ae96f877f89d3fa9213149ba8147e972b61972432858dee7a93a5ee06e2df362f6ce7e77fcc99d2db7bd5dcdb7fd13f3b7a282414a880405ef922abc09fcdf90dfdc1d36a835fdb9a812ae35bfa4e05566552704cd9bb3d2d13c9886270b14b0b7faf847541b7b32fee8e325eba44bc09116fc781bfd8eb3cd558d6968473a4774b8920227e5c56ef4bea11cbadcfb1f373635e0a2612cae262648ab2883de4c39770623604189f238416650ed169548a116d96c9cb92b701496d23bd06ae00349dab6e381eaf1cc7e3031b16457ac3101b2bfd7d4c03bf9fcc1f725cc7212348f1f2d664eaaff0bb6d99292fa11edecb4a0a4034fe492dc6a56d58d5972f65bbd56e09813cfd676aaf9155715fbccc5f9bd6903ff9b34ebfa356293b6062339d49ba543ac84e057d56e06369d43397b58769d913a4d128863470982a987b636a7c98ef6bdc7a27daf7ca71d77647ac794254c7987fe59567c75d9bdcd6192fd4a990ea27080c9937bb8e9e8c7b84c8e572b461a35e09ac893ead2f2afd8848993fadeefa85b025f7c1c9311903e5732d42c4d8b4f0acf87709e44d5c4a70afe27526144360251544587b9ae1de96ed95587166cf7b63a22ed29fd1b84bd63a2c8445097a90361ad02a7e0f3d3788eaa40d2605da9247f809e3be2a02873c4b09aea2951f7222df0dd61c972b5b82c0a1849ed2749402eeb9a29b40bda7faef8e5bcd1c5542f57a0aee34bd337ce44b32ccedc2ffbd4f688a30d68271059643a4be420ff65006ecdf0d164ad69d246ed9c0b776f3037ffa84644b692d80d0eba0620efecde8d38a488a36291bced48608e9fb993e15fc6b17d80d6b7154c5c295d8c9d4416c6a87a88c6305b04b7d34817bcdd36fb4f6872ced9995816ba1a425dd5a243e4d20e5185f0b78af0c2cc3b2b153b2878ad61f1f1a7d89c0e70cf360ff263f5c14dc4789a1fd40479a4fc70534e562edfe9d52291dd0ee0ba319926d34ece6a8772e9380ad14fe9c0cf7df4b8c4bd6c9438b62e039011493b0dbf0262d2d587426f92733f40589c7d2493fbe7d0cbccb324d15416250df1f5930465811f6d4d68d332672d007aa2216fc74f0ebe286e7f7f9f6c36801f1b3d17d28d8ee2b15d19eda075b8d5bfcc7fbd8a66ec0bbbf5bfa0fa6a8fe7f7301f7b07d50dca71c6193042b682d8d6b1a4c5f9c25baa233fd1706aa2fb5e30bb04b34905b76e38cd62b7d671ab92d8ecb3e11255e6c7909ddf4bb1a2afea5ae76227f1a7e4bc0089bbdba73de1d40f369b4f3673b8fa66dd90f65b71998e726011a6f87305b90cf9ef1a2b116d98c550018837635c5b6beaf41aa341ed73dca1660ca1470a61f1c6aea97d50db7ac6d59906c0f0511968044b223b7c22ddc4fec2445911ef97b466c79697334b96a2a1889240942fb05e259211f6031284151c448723ba4e481401ce047817dbd0d42ada646c5aec978c6404a3f520912b1cfe5f841190945f55d271e02da2131774f294ccc21260ee3f5b82986d3eb09b76e840446e2550165db318ed91d7cc595aace84b86201ffaf1bb06481cdde036e4b03053bede7f2d70786e291118864631678a486775d4949d34a1593f797f13bae945171c5e3a07c6f59d4e19a1741498c3baa8158db35c2b31c1bb84ed829866e843a90a3c93a8e7446ac99be315fc202f4d5a078713bf4ded58b6cca8914450db9d5db295f0f9a082b09c942c081ecee1593954b804e798ed16171c4b2a74d3dc90b3491ec6f45c4dd75973c06cda67b4c08e7f84262bc02d14288789db2333b01257c94f8793a51f72578a9022e6888ec040f87609a477f3eaa3270af4eab08f5c748a3fa8bb0214d6eedcfff1e015dccedd79ca5552cbe90a280f30322461afff54cf25e5367682ca140cad7e0838f30dd33f55f51be210d7e941a7fdda4a4f40edb007408c485a8e38af49de5bd90620f8a3cd9ca79beff70e954899a6626e7f5cd6f55885f1b62241cef84f3fe03aa6d07e086af5fc869597b8a8896c44b73fc27e225724224461047106c658490bae3c6c65e7b7e8b9b5d46c964146b724e29760bef54c8cafa42e28773b6a3003bdafb3995c809680cd623f4416620630094ae13974047153c8bd55fd1f39ab6e2cc62702192dd1ed4432cb0d4fdf3a795bb902853e3324af473f39f521a174353949bb25abf37d993916997804ff88ee9b628703d8fa6b269c68f40384bbc049961d65dc5911bf4e36116afedcb5ded72027ee696109b89280a15c5ac6d4c6e9423fe9ffd5435b0994c1181e3193257c7b308e8e9e091cb11550001d78d20425b3ac489d9fccf04dfd84594075fa59388a3288372cf1790dd024b1a95f0d98f63b426f37e398e0744f8f807f93c528207e15f5ce1fc7a91474266f8501e4192d03c6e29d1d49df288d7ee1523daa097a5e6c1aeb92572f57e2c6edf2dd72ad426d4a0c345293802d09e4a8a88af653751bd90eeda0237534cee604b358ae26c0d91ed894959f35320e4daad7968622ee183603baab00723cb6e015e009700e88d4624016448b217c6614e8cb39727c1193ebdfab1f4c752e36ce42a196d2e0e128f01b8beb70e7813db9b31e77589850fddf3b2bd0b65e96a7aad2d7d9446a9f66a0ab15942136ccbb082a377efa85d8410c8f70927b62ce601e513a05b922e5bd74a7973215fd07553c5af5072861619a3eecf058a2e1c73bda844a208ad7281604fddd8af7db8335df55e3cec1bd984b0a67546d5a1aaa885b3dfe88ccb935f4be6aebea01d880feb6ce6c5f4c33591ab3cd232a66a46e613dc8bfad16b029720139b7932e462765780e86983fe12d9e443f64b94449a26ed8ddf7e76a31fa4599e279e39caa0acb878f8e209d666582574130b9b7e497368053702fdf92d02b859bea7193ba271122775726c195f11f34203662d03bc6ab8f8b23366a763ac146843b2cb5cc4391751259039c03e92c0a2990905dc3b03e92b7d35822c7c41724e25558a2a3a3c872b722b713bec5586825ea49b8d17e0cf5fd4cd9f22fbe22fc323b640f149be4fa96563a8ea8bd4744787f929d3b9a6f4940deb1c872f77fff1a460118f017d9a6d86000ff61f84f056d5fe7428a5b25913a1cb895aa00d734093c97c963af6ba17a6e92ad483566824c09f506b3eed0ffd3463f6472e70662506def1ab3a2f2ba7d3dba074f3b5cfb3966a90d3b164c16216e9331361c6f0d7c23fc9ab89932ef5871bc108bb0103b6801408cb11e313b0d917239ca692c65f55f7999e0721618d2911b3959f03c46712e41a1ea9ceefe1554cad403023b2c6972c9e2fd44ab5338151a89e09113cf34245fa1e99b2995286b08295ddd07049fbf2fc58fd2fde9694d5a7a11e0fa1adf8d56cbde5a83de53c192c59c9227997f69756a353892f4c137bf5603c2a901a85187d93e4b69279b2d291a70d1ae63d064f07a1f78532368b73749186fd7ba2bebfc60af97c2ab7eb2a56a9ec798fb1a02811d0f466350c9b8163d6eec0c67a59cb7f998c4cdbddc8028b59305a90d1a7f1ef30e082b2af5db6ea0c60d25f353a90fd0e1ee7c76059ec7912f654059d8c35e849071f6a1faef2f51c98127d761e97d174541f56fede03d76457f6f7a275203190cafd4ffa86cdda692e51df9881fc51e0742afded780a7cb63ccf276fd045c88c85014fd85ae94ab02a2477b9023b713856c1d884b20804b84252bf64817c109acb522b92448086e8fdf3449345877145dc652515a992ded4a3c659604502010f2f07dfa36798227b7bcc748cfe13ab130e1c81d18f7a13590c4092e3dd407531ccfc07c809eca2c039cdbd7f360c1b42a5e0b0af7c1dafe0d3093b910848da003780a7ace35c6632ff730bee563bb529c1c3b619da3ab46fc90e83fa209abcc957dbe6413160ed173db4a228dac1d598d7e526b09a6a3e197450d403955c2ffe8ba9555d7059e29897f6baeb8bf06e9e0b60230bdb384da51a1b63113f9b3e1c6b1e26fdd808e86abab01bb841c59b608dcaea845e7d0508d99476e67783a78c1fafd2d1c9188f707bfc72cdda712989f1466366b19dfcac872b0c39e8dbd6facb75b75f907300bfb946193f889a47328ddf0304a9682d2d8bb452aa8aef1578773de25e275d287dd8782d7c446f20bace1ee924e004e862af2e831bb99c437f6db350033328181c7a4943d539c76f0ef4664e9e889c827090ba07b962326508628477458523cecde074a7246664f6cfb87575e3b61fa62f65790af275bcef18b2e10fc985cf9ae09a592919129e3e917ffa459923c307ea2213e1a867d263cd2e1a2bb2340efbc506e00382b36b67197aa6613077c6f3df1227b85b039dd152f4406cce9d3f1f2c65d095bcdcbf24ca5946ebeef0536228b54b91b3ba20f67bf3307a384b487965db38c9b1777481b673d7002cce323b75d4719a0f03b2ba20996b661259b6aa94cef4912ad1ca503b0a1274956377e758b6a0f88e5fba3b022fcdd999c283c15b7f5b5cd4a6eccf99a3652b6a68a413553d0fd80dc21cfbb5bc1de7440e3ac5028726d795472ac4aa413648020b47e05a7f29add5415a622a611ff8832f0f757073e55", &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000001340)="17d97aa20e853f8728449d4fc36776425c78818dd7be89b11ebea06091620dffd2534c29f43a91897312d4cf65987dffb8d77c25f85c69341b7ef8317b4731519bddec997cfd3efcede42810bcb8d7b9e9a2243448cde09f3422e061e96b8c79316ba5a36f951aed83af9dab64799888c964f982d4fed6a9fdd67746c858fc9de6119e104a28951fdc6af3c6f0d97631d6fd9348076a0dad37c8f5d15ff6250c590cc77314aa76bb4b02215c0b61fd6bb4921105cae4bd29218c2693a53fb2ab8dd1a523806d78caaeff631c4584e68df397646e482e8148f51afdda27eeba6ecfc2f74a8d20ad74c2d8350c0612e1590100885e8850bf7a9a09859267f888ce0097414a1fb4c3cf134c69fd83c565bff7f5ff5d18e00c1d0eab1b6295b67223234b0ad08d2644b3a407ef5bf9569903db0754805c75bb582d084f276bdb896c461dc064aec0837340bbf98f54a198b77ae35244ebb9ea1d0437576e760c25d241400060964330d7f7c5d208bcb75c18a842683dff6844239315402ed54763af876dbe8bbf047d79ca3cf0fdc4ef95ce7e88ccc15139e4e68edca31efca64b0edb3d109bc477a7ffcfb24da50b3d0c54505fd9b047069c3d19545dee28feada3002350010b0007497edba86235b5a672de957529d70804d67d3a9a7a948ea04ecb649930516be6de900ebbed165391c30586241de5f7cafa640ceae328ab1592fb2949df9506c64ae5a9926b8e0aa9abcadd30de725cc97bc4c81ab36b4fbffff649aca5e7591660ed0c2cf7846571cee501bf4bb339776d26128043cea6a03e173f877434da7b634bc8e5a43c12fe2f7e46a6f354a6188ab29590cd9d8c25af91f48560ca2b401361a2861bd5ed4e824ac2cdd81f1ff54f959725646acab72f6cf46c5c7791f2b73567e4a6c653471b870393b6e7293998f7c36e6b44f54131ab6a2149bf8f36d2cab6ec60d7d36034b000725969a516dc21af13371198b63ec0f603484561f320ecb600c268c0867607faa525ffe2a9051ff52171ba32538d837da5bf516d28e04171008b540bbf774c5faca19a5f181da685e01ae33b5fead0ccf939c75cb215fc8569f6442617c9240d2e14c4532fe7d70c3d38aa41b6377d7000b14bea27777a27e55f3852ddb2975ab7f4d369a20b7beae753e53ed44191dc4b4c6c61ae3a455b1e8656af00a23e9f9d0fc4f454156cd05b4d9dc5e0ffc6c090c6a718762bd71b931392024b1ca590519e41d7484ebf7c051cd1481172ce55935bfe63d29a5685f21fba04cd9236c075c8d233ea20c0858f508250bf8e39486841776b9d7953f153c20dddadbb14feaf0d02aaad3a092225636dfca5a175b061089d997d0da1f4b7d0ef6eb05f80293403b1898486352de5d50acb6f0ee4c585652a7c5b744110f2e5605000d215503ff6f93653b6bce58ffd329f199bb45cfa7118425ee7d0f42beb58f090b049a97c403f6499cb6a5a7491f4f1ca17ec750e3914cb9cadc2806e73ee51b395ccf399d8b950c1a5b215a279eed8a1a917318a095fba47321a36d8fda77602d9c7b5f93144365b1246303e47326b41fbcb887f33158b3f3abfff3ce9584770abdcf79f022370933af3f1cfff6352024166523539f75837355beb7389824217f6738ea0469575d0f9acd7c9c0c55b42e4d1be35a9a24d9735e8a52acb62807f3ed5e03bbce78ff54f0fe4bef04f328d3eb09a5f7a3843bd0edd903dfa51bb7ff0644389802793e913a4c658219aa69e1d53ed85ac94a441baed19d3ac2952e7f712777c6d8f63145338af7c37dba181ac3c379aff862f081e6da94566d192d4ca9c26b663172f1e8097e42c3d840e2e51a74df2c2a2328485826a1ddc517b68d211929a0e1cbed0bba2e4f129a541de371372b3ea46e1300316b3a1f784ae4fed08c3d2246978d8eeb8fa51bb390760d3a5c0efc18df64c5798af26836e49346609fa9c438645721746fc37e72a0e7eee1bdda8eaed4ae80e62d951075241059a9c1d4609a29a63b320423e59c85683a8d3bfdb0da743b01654cb5e1f70c5fd81846fcefa9ef762040643f2c891427f46ff65a6e2d55dbacd6ba3f851f39b4f32cf0138a05180927c8be2ad0f43622d4d45f79e87e4fa2d409897e612266838d4dec9b558e07fc501407c6a56fce8e0213f7ab8f3d82cdd68448b728914885d96aaec459da9346a1141920db2637734497bfe2f54fd943dbf744eb51bac356daf7adb50a44c27b8b9b3674027a8c1894c9897f8c58b773311cc95ca5279a513f4885268ac209a98ede8a5b1d3969e4a044a0334eb66c860a8e3e4e6a9acc9b7aa7c22012e2526c2b6b20d401a75386121db1734b10e22f23597b46f2538dea44be1b4b6613bafef9a2405533fe0f4ea1ccb2627a6c3eacd7ee9f840e5d0cb2f4a5ecdf01f440355f6469313908ab2c1c90903a2e385dd312103432d4b0f02ed5c3d9e68c9536898aebe3aa25ba3f6ddb584043b30f889b6ed67ff6b2f525a59a1dbe63e33fdb5f3da176258ab6d684d0a93137258a577b4ada76a48cdd67c27b6017b37a082ce7bed4c027cc2bba1c70d3009667de0674247a27f8c5e6ee267998c047f57e8e7a7e286cd7050c24a52c19c0087e5488de1a6d38713697a8fb99cc414048728a0cb6bc148cca5f4fb52502b2252efdc28b905962d0c82666a68e62b01674b1a8548f78d0f216ab8da1a5ff76fe4a460a9ac4420cfea9296dd0a73b376255070dede951a89dd14661715b7bd949efc436bb2054ec5fcd8ed30e2f3df9d4b901e9bd985783ab479ec319ed40b4d8e7d15905beea56d1781d9bf18cac4a6462829f8f4771d3a2a58598ef00839e68956133c76fb880f42f59da89079d2cb0eddca5c3cd730a6583485d5022d60b6f3e577adcb48a67581c8716bead179610d114f087bbbf19a32da0f56c2261ca85e0cfe3d9be69045536f5d0ad4960f69aab8fe72e3cd2a4f8ed0c19c30ac902a8b63511627407a6cdf97b8fb1f308a515867640d8f21233ddd0f525bb0f9177d08dcb306080ff734d1e12e5192fd3c70c0fb23463afa97a3e070f99bb3e3e55a5565e05844bd46422bcea02589953a481331cb19625fac61f79254202aa20aac3bb1c8a4f0aa2ae5dc57ba7a0b9d092640bf96db589aabff99927637342cf71388b2587f44bc695ee46043a4dc1bf70d7bb3a3d8460dfbe6888cb93be0f4e2f858554a1c2e8c2c8d606236fdd9d1bdf048c40503d79a01db4e22e987c45b9ff971d1c897da26d0708c29ffb52060fa50d537e9cca412dcb9050b7b3234f3d51b4592ee81297ffe1fe541dcfdb200c58471b17597ec592133a0f6663abf599b4a99a341b5604bcc957fe02a1a3d0b92ce5e891945f03fa2d2174dff0505b244fda9fede19bb368b6c0ab48c7911b2744e1e8bab2ff3551273f68d83f55ec206a3eea063668edd7924024f53603440e864b13d4c883aca8ab692ed18f3e72695c12d5bbeacc035e7bfca71220dbceeb70f3364519310b2f2f78ad0530cca36c05c161de84fe0efc8b88100fddf1e5f2e5e5fa337a176d1cc8bc99c3b5e03d48adbb1dc5d501d67dde5791e69c4ae946b0849c93429b1481609a2c77a4cb496665cec8b30b7092560fdb33c53cb7ba3f8eb8a906da11d536185ea795a9e892cad89ceebc744bb497ff33adfcb94fdf89a1c436e8be3f947b928773ecfcc06ece74fdb85eeeb93746964293d9ff6b49225a92863007e8d90f125ca05b62c489ec285b4d537e58e97b4249b89b9e9d77e13510ef9065ad4add0be461a0a4ea02d5ad25b1cc84616849a66e35398588c6e2cb15ced134634b82d08f4c4eb830dc56a74c8035473c8b4366a4d4be938247278ed2991694ecee373c4cf1cccd206d46bbfece76b59a307e6c4d9b922e50907a780583a64234a7893a8287b9bb1c303ba84c43ffc7b5ebc14f85969c2c5f33e1c9d0c7cf5bfb0c9c8d477cd3e9466b940a7b9116d25d3dc2ef3615c4185eabebca71c82678952b424f9902a7487f873b7819de210b15e86b245e52d1d36b98039293d71c40e52b6300880f41bab89dff1f3718e8ab97025d51a8bae3ca89ec4dc2f13e189c586944fb78712c56352538c967bf0fbdaa55d017d4ec9bad78d42ee98bd9da2dbf76a50ba3016bbeeddac9a58e4fd7a30d9d3ccb6002218bd4f66b2cb84d0b4b4a037b83b5c498e58b228b8c5549da37391004eace91edf298f9f94c9fde14944b26b874eb84d51eeea687021ec08ab24845a4f7e795b96dd847b22894a97175eafb57bdd515daf81a810ab9621bba0f300c39c96f87bdcd0f1ab686cc210c73646e973a7e6715da9eb89ff49f9cb29b6f59789934599dbfb831dc9740c0aa47dd7c6d4b9c3b4690cbcaa1ad2c404d248791a6ca6fa8d0992e726d21625d48386832b127be1218b210a435ceb059ac2e1762f9ca926eab8ca40f4e73abca5b73c02872f77e105faf13f0420c9bb449992eae79103f4dade41074a3f1627e992182e06e3ebf6a86844033bcbbc8385e25d25775e8b9afbabb9e778c8dec76fe1737793fb44f5cfef1fa937b58d5172bc4728099be179fc4042ead7d1e129551c3004832618b19f4b27c75125489e34c6d7db678f22d77137296dfeb97f1bf26280d25518969983aa360adf4d7ea612de2de34a1b5e31e9b53cefd4c207833401d4ab2dcc915ae3ffe9955b1f3070168490eb7d53c1f2cfa9811c637629db6219f799695c59af126ce2cfefdcb55b77644885be8aad72e69a7314632b730c28281cc10cc39521953ecc96a1aa96562150e24397236be5a4e67f5f26e16967fb5a72ab3f041377657e1f84819ca14b2aca8b18307a90d4238be4b0fcac3c4c23cdeb460fe1222d6861d7b5beccdcf9379bf19fe04cc81814df21c53d64092e48933414557fde7fb6a73499d86b3a6d512951994dad87f331788ee38666c96eda3843db78c123f43f5f9296776e4dd1242fc18e050174e26b76d869b5e9e2e6410fbe422c22bf39935f15d607579e7c96223c539f0b18b9b240fa9dbdaad24f5ac77e659b8578a8bf416764a89a17a526a893d5fadab5af390c8f8929251c12b95a37fc72cb0b0f44bd94e98c85633186879e52e9e8d5b445eff15df279274d72d614fd009cdb0a22674383bff94c2ead1b28e05da3bb10fd653077fe0e6ca71d5896cbb73f0add434dd1085f70db3591b1500a35d24aad5360013c4df5a8abf0a7a252ece93e453d30488fcbce70411e6b4606b3b6dbaf36fb49fe87d5f2b17cbe1e1db15c2ee9a435e96521286aa3f1290a64b0ffa6c83880e729801327df258d2bd8c8c48f8ded22b893044f220d076c232a6c7bb5fdd38066ddd58e9536643d5ec871f0f71d4ab07a1335726d68c99f3436a1b8bdbbe44d468d9fe61e0e5d0a9ad04fe401e8a9d2ea31524afc450ba2ef87007cff74e8022c3f3589c36cc157ad16fb138c55fb60d3e1ae72c451d991369f8b95a37d476e2b93a30ca05594065af36a7f81595f7cfad0ab701f392ca0b95e195fcdc5c05e571846c77d812f82c756adeffd9f10e7fb8c962f7e822bae43141e7932d987c46a357f884b3d4e884bba668e825c193530f01903511f10382d61dc9a5c24e0b044abbb3edb99693b2c53c948d870ee0391eba91e2b13025e02b6411d42d2d0249510468b9065fe63d54968c4770b47570468c5225f51aab0a65b525998b319d2d2b43f419c45daf3b3330c8fa81e5faa3525aab287cdd256dc3e143a090cfc6c75b7783ea1b5fbfeb38ab67f38736219e61ff8") r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1071.062390][ T4025] BPF:Invalid string section 01:12:28 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x7, 0xd3, 0x8}, 0x20) [ 1071.090828][ T4027] BPF:Invalid string section 01:12:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x10, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:28 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x1f00}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1071.260536][ T4036] BPF:[1] FUNC_PROTO (anon) [ 1071.265156][ T4036] BPF:return=0 args=( [ 1071.270556][ T4036] BPF:0 [ 1071.273418][ T4036] BPF:, vararg [ 1071.277940][ T4036] BPF:) [ 1071.280710][ T4036] BPF: [ 1071.283472][ T4036] BPF:Invalid arg#2 [ 1071.288392][ T4036] BPF: [ 1071.288392][ T4036] [ 1071.322326][ T4042] BPF:hdr_len not found [ 1071.327724][ T4040] BPF:[1] FUNC_PROTO (anon) [ 1071.327741][ T4040] BPF:return=0 args=( [ 1071.327752][ T4040] BPF:0 [ 1071.327761][ T4040] BPF:, vararg [ 1071.327770][ T4040] BPF:) [ 1071.327779][ T4040] BPF: [ 1071.327788][ T4040] BPF:Invalid arg#2 [ 1071.327797][ T4040] BPF: [ 1071.327797][ T4040] [ 1071.368046][ T4047] BPF:hdr_len not found [ 1071.378297][ T4046] hfsplus: gid requires an argument [ 1071.383507][ T4046] hfsplus: unable to parse mount options [ 1071.402385][ T4051] BPF:[1] FUNC_PROTO (anon) [ 1071.410236][ T4051] BPF:return=0 args=( [ 1071.414277][ T4051] BPF:0 (invalid-name-offset) [ 1071.419023][ T4051] BPF:, 0 [ 1071.422065][ T4051] BPF:, vararg [ 1071.425437][ T4051] BPF:) 01:12:28 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x210000, 0x1) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000140)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r3, 0xc04064a0, &(0x7f00000002c0)={&(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x9, 0x1f9, 0xa}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1071.428233][ T4051] BPF: [ 1071.430996][ T4051] BPF:Invalid arg#1 [ 1071.434800][ T4051] BPF: [ 1071.434800][ T4051] [ 1071.473141][ T4064] BPF:[1] FUNC_PROTO (anon) [ 1071.479242][ T4064] BPF:return=0 args=( [ 1071.483236][ T4064] BPF:0 (invalid-name-offset) [ 1071.487984][ T4064] BPF:, 0 [ 1071.490422][ T4068] device vlan1282 entered promiscuous mode [ 1071.491009][ T4064] BPF:, vararg [ 1071.491021][ T4064] BPF:) [ 1071.502960][ T4064] BPF: [ 1071.505761][ T4064] BPF:Invalid arg#1 [ 1071.509567][ T4064] BPF: [ 1071.509567][ T4064] 01:12:29 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x7}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:29 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x2000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}], [], 0x68}) 01:12:29 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r5, 0xc01064b3, 0xfffffffffffffffd) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00c642d, &(0x7f0000000100)={r4}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000000)={r4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r6, 0xc02064b2, &(0x7f00000000c0)={0x8005, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:12:29 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0xa, 0xd3, 0x8}, 0x20) 01:12:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x12, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1071.791578][ T4087] BPF:[1] FUNC_PROTO (anon) [ 1071.801044][ T4087] BPF:return=0 args=( [ 1071.805045][ T4087] BPF:0 [ 1071.809160][ T4087] BPF:, vararg [ 1071.812546][ T4087] BPF:) [ 1071.815309][ T4087] BPF: [ 1071.818157][ T4087] BPF:Invalid arg#2 [ 1071.821967][ T4087] BPF: [ 1071.821967][ T4087] [ 1071.834036][ T4088] BPF:[1] FUNC_PROTO (anon) 01:12:29 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x8}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1071.840054][ T4088] BPF:return=0 args=( [ 1071.844042][ T4088] BPF:0 [ 1071.846932][ T4088] BPF:, vararg [ 1071.850306][ T4088] BPF:) [ 1071.853065][ T4088] BPF: [ 1071.855862][ T4088] BPF:Invalid arg#2 [ 1071.859664][ T4088] BPF: [ 1071.859664][ T4088] [ 1071.952390][ T4094] BPF:[1] FUNC_PROTO (anon) [ 1071.959938][ T4094] BPF:return=0 args=( [ 1071.963936][ T4094] BPF:0 (invalid-name-offset) [ 1071.969853][ T4094] BPF:, 0 [ 1071.972882][ T4094] BPF:, vararg [ 1071.977578][ T4094] BPF:) [ 1071.980347][ T4094] BPF: [ 1071.983111][ T4094] BPF:Invalid arg#1 [ 1071.988216][ T4094] BPF: [ 1071.988216][ T4094] [ 1072.009341][ T4100] BPF:[1] FUNC_PROTO (anon) [ 1072.013983][ T4100] BPF:return=0 args=( [ 1072.019185][ T4100] BPF:0 (invalid-name-offset) [ 1072.023868][ T4100] BPF:, 0 [ 1072.028332][ T4100] BPF:, vararg [ 1072.031708][ T4100] BPF:) [ 1072.034470][ T4100] BPF: [ 1072.038618][ T4100] BPF:Invalid arg#1 [ 1072.042463][ T4100] BPF: [ 1072.042463][ T4100] 01:12:29 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x18, 0xd3, 0x8}, 0x20) 01:12:29 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x2400}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:29 executing program 0: ioctl$INCFS_IOC_GET_FILLED_BLOCKS(0xffffffffffffffff, 0x80286722, &(0x7f0000000000)={&(0x7f00000001c0)=""/73, 0x49, 0x2, 0x2}) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000140)={0x400, 0x1003, 0x8}) [ 1072.089946][ T4103] device vlan1283 entered promiscuous mode [ 1072.098792][ T4102] BPF:btf_header not found [ 1072.100460][ T4107] BPF:btf_header not found [ 1072.233963][ T4120] BPF:[1] FUNC_PROTO (anon) [ 1072.239886][ T4120] BPF:return=0 args=( [ 1072.244252][ T4120] BPF:0 [ 1072.248510][ T4120] BPF:, vararg [ 1072.250984][ T4117] hfsplus: gid requires an argument [ 1072.252061][ T4120] BPF:) [ 1072.252073][ T4120] BPF: [ 1072.252084][ T4120] BPF:Invalid arg#2 [ 1072.252094][ T4120] BPF: [ 1072.252094][ T4120] [ 1072.260196][ T4121] BPF:[1] FUNC_PROTO (anon) 01:12:29 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0xa}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1072.262537][ T4117] hfsplus: unable to parse mount options [ 1072.287866][ T4121] BPF:return=0 args=( [ 1072.291858][ T4121] BPF:0 [ 1072.294711][ T4121] BPF:, vararg [ 1072.299370][ T4121] BPF:) [ 1072.302130][ T4121] BPF: [ 1072.304887][ T4121] BPF:Invalid arg#2 [ 1072.309773][ T4121] BPF: [ 1072.309773][ T4121] [ 1072.367643][ T4128] hfsplus: gid requires an argument [ 1072.372961][ T4128] hfsplus: unable to parse mount options 01:12:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}], [], 0x6c}) 01:12:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x19, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1074.898624][ T4150] BPF:No data [ 1074.920668][ T4151] BPF:[1] FUNC_PROTO (anon) [ 1074.925286][ T4151] BPF:return=0 args=( [ 1074.930657][ T4151] BPF:0 [ 1074.933522][ T4151] BPF:, vararg [ 1074.936957][ T4151] BPF:) [ 1074.939718][ T4151] BPF: [ 1074.942483][ T4151] BPF:Invalid arg#2 [ 1074.946346][ T4151] BPF: [ 1074.946346][ T4151] [ 1074.976608][ T4153] BPF:[1] FUNC_PROTO (anon) [ 1074.981245][ T4153] BPF:return=0 args=( [ 1074.985233][ T4153] BPF:0 [ 1074.989143][ T4153] BPF:, vararg [ 1074.992525][ T4153] BPF:) [ 1074.995282][ T4153] BPF: [ 1074.999106][ T4153] BPF:Invalid arg#2 [ 1075.002912][ T4153] BPF: [ 1075.002912][ T4153] [ 1075.018960][ T4156] BPF:[1] FUNC_PROTO (anon) [ 1075.023643][ T4156] BPF:return=0 args=( [ 1075.028896][ T4156] BPF:0 (invalid-name-offset) [ 1075.033585][ T4156] BPF:, 0 [ 1075.037801][ T4156] BPF:, vararg [ 1075.041178][ T4156] BPF:) [ 1075.043945][ T4156] BPF: [ 1075.047997][ T4156] BPF:Invalid arg#1 [ 1075.051813][ T4156] BPF: [ 1075.051813][ T4156] 01:12:32 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x23, 0xd3, 0x8}, 0x20) [ 1075.081885][ T4158] BPF:[1] FUNC_PROTO (anon) [ 1075.087667][ T4158] BPF:return=0 args=( [ 1075.091664][ T4158] BPF:0 (invalid-name-offset) [ 1075.097586][ T4158] BPF:, 0 [ 1075.100613][ T4158] BPF:, vararg [ 1075.103982][ T4158] BPF:) [ 1075.107816][ T4158] BPF: [ 1075.110589][ T4158] BPF:Invalid arg#1 [ 1075.114393][ T4158] BPF: [ 1075.114393][ T4158] 01:12:32 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x1c}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1075.127979][ T4167] hfsplus: gid requires an argument [ 1075.133188][ T4167] hfsplus: unable to parse mount options 01:12:32 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x2600}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1075.252672][ T4177] device vlan1284 entered promiscuous mode [ 1075.290435][ T4184] hfsplus: gid requires an argument [ 1075.296945][ T4184] hfsplus: unable to parse mount options 01:12:33 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:12:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}], [], 0x74}) 01:12:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x2c, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1075.703960][ T4197] BPF:[1] FUNC_PROTO (anon) [ 1075.709580][ T4197] BPF:return=0 args=( [ 1075.713575][ T4197] BPF:0 (invalid-name-offset) [ 1075.719560][ T4197] BPF:, 0 [ 1075.722973][ T4197] BPF:, vararg [ 1075.727718][ T4197] BPF:) [ 1075.730487][ T4197] BPF: [ 1075.733257][ T4197] BPF:Invalid arg#1 [ 1075.737136][ T4197] BPF: [ 1075.737136][ T4197] [ 1075.749889][ T4199] BPF:[1] FUNC_PROTO (anon) [ 1075.754495][ T4199] BPF:return=0 args=( [ 1075.759701][ T4199] BPF:0 (invalid-name-offset) [ 1075.764383][ T4199] BPF:, 0 [ 1075.768600][ T4199] BPF:, vararg [ 1075.771976][ T4199] BPF:) [ 1075.774857][ T4199] BPF: [ 1075.778678][ T4199] BPF:Invalid arg#1 [ 1075.779757][ T4200] BPF:Total section length too long [ 1075.782488][ T4199] BPF: [ 1075.782488][ T4199] 01:12:33 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4800}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:33 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x2b, 0xd3, 0x8}, 0x20) [ 1075.821844][ T4207] BPF:[1] FUNC_PROTO (anon) [ 1075.828051][ T4207] BPF:return=0 args=( [ 1075.832043][ T4207] BPF:0 [ 1075.834898][ T4207] BPF:, vararg [ 1075.839647][ T4207] BPF:) [ 1075.842421][ T4207] BPF: [ 1075.845184][ T4207] BPF:Invalid arg#2 [ 1075.849045][ T4207] BPF: [ 1075.849045][ T4207] [ 1075.861461][ T4204] BPF:Total section length too long 01:12:33 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x1e}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:33 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x2d, 0xd3, 0x8}, 0x20) [ 1076.087663][ T4219] BPF:Total section length too long [ 1076.097971][ T4221] BPF:Total section length too long [ 1076.591533][ T4227] BPF:[1] FUNC_PROTO (anon) [ 1076.593002][ T4233] BPF:[1] FUNC_PROTO (anon) [ 1076.597402][ T4227] BPF:return=0 args=( [ 1076.597419][ T4227] BPF:0 (invalid-name-offset) [ 1076.597432][ T4227] BPF:, 0 [ 1076.597442][ T4227] BPF:, vararg [ 1076.597452][ T4227] BPF:) [ 1076.597461][ T4227] BPF: [ 1076.597472][ T4227] BPF:Invalid arg#1 [ 1076.597481][ T4227] BPF: [ 1076.597481][ T4227] [ 1076.601374][ T4241] BPF:[1] FUNC_PROTO (anon) [ 1076.603185][ T4233] BPF:return=0 args=( [ 1076.603199][ T4233] BPF:0 [ 1076.603209][ T4233] BPF:, vararg [ 1076.603219][ T4233] BPF:) [ 1076.608284][ T4241] BPF:return=0 args=( [ 1076.611924][ T4233] BPF: [ 1076.611936][ T4233] BPF:Invalid arg#2 [ 1076.614934][ T4241] BPF:0 (invalid-name-offset) [ 1076.620599][ T4233] BPF: [ 1076.620599][ T4233] [ 1076.622555][ T4241] BPF:, 0 [ 1076.644196][ T4240] BPF:[1] FUNC_PROTO (anon) [ 1076.645301][ T4241] BPF:, vararg [ 1076.649757][ T4240] BPF:return=0 args=( 01:12:34 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4c00}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1076.651172][ T4241] BPF:) [ 1076.653917][ T4240] BPF:0 [ 1076.660169][ T4241] BPF: [ 1076.660650][ T4240] BPF:, vararg [ 1076.664435][ T4241] BPF:Invalid arg#1 [ 1076.671341][ T4240] BPF:) [ 1076.673955][ T4241] BPF: [ 1076.673955][ T4241] [ 1076.676988][ T4240] BPF: [ 1076.721262][ T4240] BPF:Invalid arg#2 [ 1076.725071][ T4240] BPF: [ 1076.725071][ T4240] [ 1076.740186][ T4248] hfsplus: unable to parse mount options 01:12:34 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x2e}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}], [], 0x7a}) 01:12:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x48, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:34 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000000)={0xfffffffa, 0xc635, 0x9}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:12:34 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x30, 0xd3, 0x8}, 0x20) [ 1077.045912][ T4260] BPF:Total section length too long [ 1077.058827][ T4261] BPF:Total section length too long [ 1077.852804][ T4273] BPF:[1] FUNC_PROTO (anon) [ 1077.853997][ T4272] BPF:[1] FUNC_PROTO (anon) [ 1077.858521][ T4273] BPF:return=0 args=( [ 1077.862201][ T4272] BPF:return=0 args=( [ 1077.867448][ T4273] BPF:0 [ 1077.867460][ T4273] BPF:, vararg [ 1077.867470][ T4273] BPF:) [ 1077.867479][ T4273] BPF: [ 1077.867489][ T4273] BPF:Invalid arg#2 [ 1077.867499][ T4273] BPF: [ 1077.867499][ T4273] [ 1077.898147][ T4272] BPF:0 (invalid-name-offset) [ 1077.902833][ T4272] BPF:, 0 [ 1077.905936][ T4272] BPF:, vararg [ 1077.909312][ T4272] BPF:) [ 1077.912073][ T4272] BPF: [ 1077.914836][ T4272] BPF:Invalid arg#1 [ 1077.918696][ T4272] BPF: [ 1077.918696][ T4272] [ 1077.950543][ T4280] BPF:Total section length too long [ 1077.962728][ T4274] BPF:[1] FUNC_PROTO (anon) [ 1077.970013][ T4274] BPF:return=0 args=( [ 1077.974015][ T4274] BPF:0 (invalid-name-offset) [ 1077.979999][ T4274] BPF:, 0 [ 1077.983027][ T4274] BPF:, vararg [ 1077.984800][ T4284] BPF:Total section length too long [ 1077.986543][ T4274] BPF:) [ 1077.986563][ T4274] BPF: 01:12:35 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x48}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:35 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x1000000, 0xd3, 0x8}, 0x20) [ 1077.986573][ T4274] BPF:Invalid arg#1 [ 1077.986583][ T4274] BPF: [ 1077.986583][ T4274] [ 1077.994868][ T4277] hfsplus: unable to parse mount options [ 1077.997063][ T4276] BPF:[1] FUNC_PROTO (anon) [ 1077.997080][ T4276] BPF:return=0 args=( [ 1077.997091][ T4276] BPF:0 [ 1077.997100][ T4276] BPF:, vararg [ 1077.997109][ T4276] BPF:) [ 1077.997118][ T4276] BPF: [ 1077.997127][ T4276] BPF:Invalid arg#2 [ 1077.997136][ T4276] BPF: [ 1077.997136][ T4276] [ 1078.123021][ T4299] device vlan1285 entered promiscuous mode 01:12:35 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) clone(0x80000, &(0x7f00000001c0)="14db345faab53570c65c4f1423c94f338ef6437353a95afad06534fed33d94de556f42f9cac2dc1271f63ea95c495b5f3ed79f63bc41fd817566a614fcf0df50d3e42a4d0c50d517c2980d7c2335010ce5826efc788fb27861df", &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000240)="a35ebe9926a685a2e4080b2e006e190ae90934dd31d81f5bb62dcad6d8ffd7648c84c35f9db9e9bf51709b3962198d3d4abd7096188beb96f0a05beb8325b389890917e6bd4d802f6c4cb8589cb40eebf4868b52cf86e727f3ea1db0819f215fba74cc894adc59e816d4c700da7befddf376711a6e8af9afd1d6e8c14ef71198883bb4405376e6ac4415522e853c095d0b225dd4d670f76fec469eac7ca5d1e08384a31a9acba521eb") r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1078.246864][ T4307] BPF:[1] FUNC_PROTO (anon) [ 1078.251553][ T4307] BPF:return=0 args=( [ 1078.258045][ T4307] BPF:0 [ 1078.260915][ T4307] BPF:, vararg [ 1078.264285][ T4307] BPF:) [ 1078.268466][ T4307] BPF: [ 1078.271263][ T4307] BPF:Invalid arg#2 [ 1078.276392][ T4307] BPF: [ 1078.276392][ T4307] [ 1078.293604][ T4310] BPF:[1] FUNC_PROTO (anon) [ 1078.300567][ T4310] BPF:return=0 args=( [ 1078.304564][ T4310] BPF:0 [ 1078.308470][ T4310] BPF:, vararg [ 1078.311846][ T4310] BPF:) [ 1078.314603][ T4310] BPF: [ 1078.318480][ T4310] BPF:Invalid arg#2 [ 1078.322299][ T4310] BPF: [ 1078.322299][ T4310] 01:12:35 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x4c}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:36 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x6000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1078.631341][ T4306] BPF:Unsupported section found 01:12:36 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x20000036, 0xd3, 0x8}, 0x20) 01:12:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}], [], 0x88}) 01:12:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x4a, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:37 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x6}, 0x20) [ 1079.829564][ T4332] BPF:[1] FUNC_PROTO (anon) [ 1079.834250][ T4332] BPF:return=0 args=( [ 1079.839324][ T4332] BPF:0 [ 1079.842187][ T4332] BPF:, vararg [ 1079.846891][ T4332] BPF:) [ 1079.849665][ T4332] BPF: [ 1079.852430][ T4332] BPF:Invalid arg#2 [ 1079.857337][ T4332] BPF: [ 1079.857337][ T4332] [ 1079.872766][ T4341] BPF:[1] FUNC_PROTO (anon) [ 1079.878886][ T4341] BPF:return=0 args=( [ 1079.882914][ T4341] BPF:0 (invalid-name-offset) [ 1079.888969][ T4341] BPF:, 0 [ 1079.892001][ T4341] BPF:, vararg [ 1079.896584][ T4341] BPF:) [ 1079.897340][ T4336] BPF:[1] FUNC_PROTO (anon) [ 1079.899348][ T4341] BPF: [ 1079.899361][ T4341] BPF:Invalid arg#1 [ 1079.899371][ T4341] BPF: [ 1079.899371][ T4341] [ 1079.917573][ T4336] BPF:return=0 args=( [ 1079.921903][ T4336] BPF:0 [ 1079.924759][ T4336] BPF:, vararg [ 1079.929298][ T4336] BPF:) [ 1079.932065][ T4336] BPF: [ 1079.934825][ T4336] BPF:Invalid arg#2 [ 1079.938681][ T4336] BPF: [ 1079.938681][ T4336] 01:12:37 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x6800}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:37 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x5f}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:37 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x1}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x2840, 0x61) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) syz_open_dev$dri(&(0x7f0000000000), 0x4, 0x8000) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1080.273547][ T4350] hfsplus: gid requires an argument [ 1080.280276][ T4350] hfsplus: unable to parse mount options [ 1080.339061][ T4352] device vlan1286 entered promiscuous mode 01:12:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}], [], 0xfe}) 01:12:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x4c, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1081.035618][ T4370] BPF:[1] FUNC_PROTO (anon) [ 1081.040278][ T4370] BPF:return=0 args=( [ 1081.044270][ T4370] BPF:0 (invalid-name-offset) [ 1081.051628][ T4370] BPF:, 0 [ 1081.054670][ T4370] BPF:, vararg [ 1081.059419][ T4370] BPF:) [ 1081.062231][ T4370] BPF: [ 1081.065052][ T4370] BPF:Invalid arg#1 [ 1081.068860][ T4370] BPF: [ 1081.068860][ T4370] 01:12:38 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x9}, 0x20) [ 1081.081809][ T4372] BPF:[1] FUNC_PROTO (anon) [ 1081.087614][ T4372] BPF:return=0 args=( [ 1081.091612][ T4372] BPF:0 (invalid-name-offset) [ 1081.097420][ T4372] BPF:, 0 [ 1081.100453][ T4372] BPF:, vararg [ 1081.103829][ T4372] BPF:) [ 1081.107874][ T4372] BPF: [ 1081.110656][ T4372] BPF:Invalid arg#1 [ 1081.114459][ T4372] BPF: [ 1081.114459][ T4372] 01:12:38 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x6c00}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:39 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000000)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1082.156051][ T4384] BPF:[1] FUNC_PROTO (anon) [ 1082.160677][ T4384] BPF:return=0 args=( [ 1082.164662][ T4384] BPF:0 [ 1082.168650][ T4384] BPF:, vararg [ 1082.172027][ T4384] BPF:) [ 1082.176424][ T4384] BPF: [ 1082.179197][ T4384] BPF:Invalid arg#2 [ 1082.183001][ T4384] BPF: [ 1082.183001][ T4384] [ 1082.210139][ T4394] BPF:[1] FUNC_PROTO (anon) [ 1082.216035][ T4394] BPF:return=0 args=( [ 1082.220031][ T4394] BPF:0 [ 1082.222879][ T4394] BPF:, vararg [ 1082.227527][ T4394] BPF:) [ 1082.230297][ T4394] BPF: [ 1082.233066][ T4394] BPF:Invalid arg#2 [ 1082.237912][ T4394] BPF: [ 1082.237912][ T4394] [ 1082.280896][ T4397] BPF:[1] FUNC_PROTO (anon) [ 1082.286737][ T4397] BPF:return=0 args=( [ 1082.290734][ T4397] BPF:0 (invalid-name-offset) [ 1082.292122][ T4398] hfsplus: gid requires an argument [ 1082.296760][ T4397] BPF:, 0 [ 1082.300687][ T4398] hfsplus: unable to parse mount options [ 1082.310501][ T4397] BPF:, vararg [ 1082.313890][ T4397] BPF:) [ 1082.317639][ T4397] BPF: [ 1082.320413][ T4397] BPF:Invalid arg#1 [ 1082.324217][ T4397] BPF: [ 1082.324217][ T4397] 01:12:39 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x10}, 0x20) [ 1082.338239][ T4401] BPF:[1] FUNC_PROTO (anon) [ 1082.342853][ T4401] BPF:return=0 args=( [ 1082.348166][ T4401] BPF:0 (invalid-name-offset) [ 1082.352849][ T4401] BPF:, 0 [ 1082.357534][ T4401] BPF:, vararg [ 1082.360909][ T4401] BPF:) [ 1082.363676][ T4401] BPF: [ 1082.367442][ T4401] BPF:Invalid arg#1 [ 1082.371249][ T4401] BPF: [ 1082.371249][ T4401] 01:12:39 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x60}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x60, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}], [], 0xff}) 01:12:40 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/meminfo\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000001c0)={0xfffffff7, 0x8, 0x6, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000200)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f00000000c0)={0x1, 0x2000005, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r4}) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000000)={0x3e, 0x8, 0x18}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0xef, 0x1003, 0x8}) 01:12:40 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x7400}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:40 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x1d}, 0x20) [ 1082.706831][ T4437] BPF:[1] FUNC_PROTO (anon) [ 1082.711471][ T4437] BPF:return=0 args=( [ 1082.716635][ T4437] BPF:0 [ 1082.719504][ T4437] BPF:, vararg [ 1082.722912][ T4437] BPF:) [ 1082.726713][ T4437] BPF: [ 1082.729486][ T4437] BPF:Invalid arg#2 [ 1082.733295][ T4437] BPF: [ 1082.733295][ T4437] [ 1082.751874][ T4443] device vlan1287 entered promiscuous mode [ 1082.763876][ T4442] BPF:[1] FUNC_PROTO (anon) [ 1082.769647][ T4442] BPF:return=0 args=( [ 1082.773695][ T4442] BPF:0 [ 1082.777831][ T4442] BPF:, vararg [ 1082.781209][ T4442] BPF:) [ 1082.783974][ T4442] BPF: [ 1082.788273][ T4442] BPF:Invalid arg#2 [ 1082.792246][ T4442] BPF: [ 1082.792246][ T4442] 01:12:40 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x68}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x68, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1082.853310][ T4454] hfsplus: gid requires an argument [ 1082.859712][ T4454] hfsplus: unable to parse mount options 01:12:40 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x24}, 0x20) 01:12:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000100)) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) r6 = socket$packet(0x11, 0x2, 0x300) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@dellink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x8401}}, 0x20}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r6, 0x89fa, &(0x7f0000000700)={'syztnl0\x00', &(0x7f0000000680)={'ip6_vti0\x00', r5, 0x29, 0x4, 0x9, 0x1f, 0x48, @dev={0xfe, 0x80, '\x00', 0x12}, @dev={0xfe, 0x80, '\x00', 0x34}, 0x7800, 0x7, 0x40, 0xfffffe00}}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000840)={&(0x7f0000000740)={0xc8, 0x0, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x40000}, 0x8084) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000600)=0xe8) sendmsg$inet(r2, &(0x7f0000000800)={&(0x7f0000000040)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000080)="d115366b67d17b5346d6e66f74753651d8d6b3", 0x13}, {&(0x7f00000000c0)="65af76f0dc9046a9f84b55635ced56317a330713c145b76ab0edc5243b50e67e6c800a31c46bdd058f9aa7a425a7f6e74ca9df4fc6b093cd1f17e74645c960c2e0a4e1249e4ed4c1cb93f2aaa9765ac288a29c61cd525c63b1f522e9ec418cd34b9be5f7bf1eca41e69e7bcb5e0113209be74925e1bdef986b78c1676ecde7e6760bef99768dd6b691bb085b98", 0x8d}, {&(0x7f0000000200)="f6ee361c13b154318bb3bb48c2548974746cf43e2a57238d06d5360a8c5227df80bf5160f60a6e819f7210aa10ea7f6eba214863771dd4eb3130364e4d751a60d530cdf6f965eb290ae07cc2c97c696a661983935a42624ec26420f24323176c09203d291311a5c4bfef9f5f86c186ddaa8d4a87a6a4f2e81750e339c9", 0x7d}], 0x3, &(0x7f0000000640)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@noop, @timestamp={0x44, 0x14, 0x96, 0x0, 0xe, [0xffff, 0x7, 0x3da2c89, 0x1000]}, @ra={0x94, 0x4, 0x1}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0xb28}}, @ip_tos_u8={{0x11}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @private=0xa010101, @private=0xa010101}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_retopts={{0xac, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0xe3, 0x3, 0xf, [{@local, 0x7}, {@broadcast, 0x3}, {@empty, 0x401}, {@private=0xa010102, 0x9}, {@local, 0x5}]}, @timestamp_addr={0x44, 0x34, 0x13, 0x1, 0x0, [{@rand_addr=0x64010100, 0x4}, {@private=0xa010101, 0x8}, {@local, 0x96}, {@multicast2, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x4}, {@dev={0xac, 0x14, 0x14, 0x40}}]}, @timestamp_addr={0x44, 0x3c, 0xd7, 0x1, 0x9, [{@dev={0xac, 0x14, 0x14, 0xe}, 0x5}, {@loopback, 0x5}, {@remote, 0x6}, {@private=0xa010100}, {@broadcast, 0x4}, {@local, 0x7ff}, {@private=0xa010102, 0x3}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @multicast2, @dev={0xac, 0x14, 0x14, 0x41}}}}], 0x198}, 0x40801) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1083.052835][ T4475] BPF:[1] FUNC_PROTO (anon) [ 1083.058742][ T4475] BPF:return=0 args=( [ 1083.062738][ T4475] BPF:0 (invalid-name-offset) [ 1083.068491][ T4475] BPF:, 0 [ 1083.071526][ T4475] BPF:, vararg [ 1083.076319][ T4475] BPF:) [ 1083.079088][ T4475] BPF: [ 1083.081855][ T4475] BPF:Invalid arg#1 [ 1083.086862][ T4475] BPF: [ 1083.086862][ T4475] [ 1083.110095][ T4476] BPF:[1] FUNC_PROTO (anon) [ 1083.115953][ T4476] BPF:return=0 args=( [ 1083.119947][ T4476] BPF:0 (invalid-name-offset) [ 1083.125946][ T4476] BPF:, 0 [ 1083.128976][ T4476] BPF:, vararg [ 1083.132343][ T4476] BPF:) [ 1083.136332][ T4476] BPF: [ 1083.139102][ T4476] BPF:Invalid arg#1 [ 1083.142904][ T4476] BPF: [ 1083.142904][ T4476] [ 1083.164234][ T4492] device vlan1288 entered promiscuous mode [ 1083.200443][ T4498] BPF:[1] FUNC_PROTO (anon) [ 1083.206319][ T4498] BPF:return=0 args=( [ 1083.210312][ T4498] BPF:0 [ 1083.213163][ T4498] BPF:, vararg [ 1083.217502][ T4498] BPF:) [ 1083.220274][ T4498] BPF: [ 1083.223040][ T4498] BPF:Invalid arg#2 [ 1083.228152][ T4498] BPF: [ 1083.228152][ T4498] 01:12:40 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) sendmmsg(0xffffffffffffffff, &(0x7f0000002f40)=[{{&(0x7f00000001c0)=@vsock={0x28, 0x0, 0xffffffff}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000000)="0d9c11a677e2bd4ef1d5a04096084b0db3160aecd4abe563467e8fa6eb5e0443561ad8bb6370724383479b75a0075721cc4d3bd48bd53170", 0x38}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000000240)="6dc31280f551ff8f5fb50b6cb43430d8d327a8c900095599120adf0b01cac3608c7a66253b6ab2d10e523e5eb70802c1c04a78ae96edca1c8a34f2c3073e5a2669627b039ca4cb75f8e14f21338499ebbe", 0x51}], 0x3}}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001340)="8ba7f12e5377bd7c09e72dc1a279808f00ac3e8debb6fc25ad5ae03814834d5b8db7f3190e6aa49050ff708fc74fb0e2541343bfde74557cf0f80f2f8e710e0d0183d7ded4083807c32d68d0bcb7558dd83b7dc58c0710a022f5293195eb8397f025a7f59f90de16080be60abd0011eb7aa9cfa63932a71b342450d39fc67994902f4ebe8d03b9104848c1b87d984ae68608cbec439850c62d53ccafbcdae6a157806c5ef4312fdbad3028bd48d03da2a3a27ce565b2b9a84e610df8bd3b5320447c8f430a662cb64f17aee5f86436642de42b13a443bc048388d3b06e82b8df244fa56f80", 0xe5}, {&(0x7f0000001440)="4d7a66306d7afcff9bcb2af131703a1deea3f50a2e1771a797e84d996afcfb27bda5f0a2d4600a1b8023dddbca7c1462263fcdd2f87e6101b5f3f77f85d3d2b6ddedc8eb3be84c6422b977a9ae284b4cf93427f6cea082fcb4540f1edb0fb390bc022729e6dedc3fbf73d883240dc28db5a809a16a72b27f58b657d2ca6a1e", 0x7f}, {&(0x7f00000014c0)="63406f3e20f469b3db9430951f2cf8487d09a9ba25848931f0cd3e281fc203f956ea6f287d56082603faec1fcd7e55b3b52dd4b9761521c786be76c98db3a8432ec2791e9e956a716478ca1d3e15928a28e35ddb4188f1a016d79bc06ebe4e757d82d6ba51afebde742cdfd1a7ceaa1f8ccb4a6cf326b6b6df7f9fa034f63e66005bec3218c11badff9284a986da1d4be03eff3ef8dd889c469f3e40c2a7e00123eb5b2da7d15da25402ce9ad4cf4e666ef0ab2af91d265f2fdea68ddca0dc8c65083daa4f7053f452af8887959301559c5fd80505d799157c7fe8084fb5af7537c39a99", 0xe4}], 0x3, &(0x7f00000015c0)=[{0xb8, 0x117, 0x9, "ea5cc9c368e7b1a22cfae18acc75e26aab1aeb02b32c97444388c68fccb7071c77c3bd99aeab5dcdeafed4256f2c69d744595a9c7997ccf0cf4194a50fba1228e45b7d357edadf04d703242690acbd8471e42a464e509e8d13c5866ab0a9d274c3adfcb58fba12660408a93446217894e6e36ec7bb32c146500a42dba2e39e491c49504ee2df3a9c012f99e2ef176bd709639552792f81a22217ef6662490b16bc"}, {0xc8, 0x110, 0x4, "84340b4608280e3de19c7f0581ac52f7e91009eef9e126af4eeb4dece65e69fa5124e7fd4b6755e18e27025173d32263925f29af3dd38bf58973bff963d26a2306e20e678609dad405a0a3c407adef23263d59a47f66db0b41ad632b9ee03f9f9cb918dc14764a67e5448cc48d6ca80f43b10c42b562297becb7a62316c9165b7d6dba80f3585f1022bc6722077c124a211fa4535fa5e4db5751cea7ebccdff5246212e13b0fc337bcf5f2b36229e5c6b2dc38b5"}, {0xf8, 0x6, 0x4800000, "e391940c12e401cef01f4295a6979927d52c8f9e823ea008f351ec228e85782904df9c3988b844c6a75708e2348921fd1738a3cc99acc2d9aa7441b54018eca4a20fa578cd8fdbd4683de1a500d61102ca17be342a66044fc6d23c95dd1c6cc1b637868670d09b785f39cac119c53010c9fc4373c996d3480845dde1d01273575ad1c6290b2906a3b7a521bf8ce87bf0fe242eeea68648d2b18d3cea6345eeb2ca073f7d90db9382dc9e4fb82e6c7b136eea2087cdc0a044850ba4bba333fa84b0203d714bf20d79eb40acf8d29e50abef7ec356dfcb5e65e8bbd2e3a2ef856100d095db"}], 0x278}}, {{&(0x7f0000001840)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @broadcast}}, 0x80, &(0x7f0000001c00)=[{&(0x7f00000018c0)="5d0a6f9227bea26079d9e54ad53649ebf91e0db19b99b183d6a19b7c9c7c107fa56cbf97019666e3db993d828b1dddf2d0191e39bef1c51ee4367a4481360db938ae478dc4f5273d7ed60828fa13cec9059f57544be2193b7b8c9063224f48a9087f4549eb90531a0dd5cc0bf89382e5e75f486499d6cfa2ba21ea5b3e7366c3485f13ffe0681b7c2c2c25c237c68004e701dab9a4dcdce641fdd913f82d2db3509d00240a6a3617b4c4296f3193be96b53dd7c2d4f5385eb78be16e298b35179767cd3855e86cee23a22e6b875d178ec6978ce4d9d07b45d6e797edab390f", 0xdf}, {&(0x7f00000019c0)="578efde54a60ba9f64058b7fd9919212ab9f59751542f20581a7ba60f425292ddd9480ede92917ffbecb2c683301886c4e209e6973058af4c59df1f94d1302559b7b6b1b8c0ae3e7c357e4be838c92f08dde3b55f50bc8b7f08e513208a9d1c53e804ba02dd4e11cf26f373499369efe6023c6795415211680a82da3842646ea83e9e858f5fe3d4a7db0a6b8f6e043305572d88a1292bb16c81df71b22085e10642700d35e88e780c9416320a8efe446774ba3ac01c73f06d69903ed0699f18ca4ea", 0xc2}, {&(0x7f0000001ac0)="6cc1166517f59e2d04c4526718e33f949d1b048bfcabc770db0276f30f495a6609f92fea1b38eba4fb47a830c97bc9b103c26baa7349692e29021df15dab03dba54c7a9f3c0f6bc5f8472dc17bbcec8bd1a88d51f14275e21f8044ddb2ded605f1d675e21ff6728f60a13d9cc8b507bba9ca5c84c96fe70c67fb0d1d6f5e10b4661204e00549eaccec63ae44193fc1fa586949cf7f2ac8607311f3f15e74176cf04bc20e25e5961d97eb", 0xaa}, {&(0x7f0000001b80)="54fe6dc5ad68bc9615cb14f7410e9087e269daceef066155df778f7e44549b1e839adccb9fd8c7192cb7389c4c02c857083e6eee2bf899533bd40df2217c492218c6f143bf61c54a7771dae09d2c", 0x4e}], 0x4, &(0x7f0000001c40)=[{0x1010, 0x108, 0x0, "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"}, {0xc8, 0x117, 0xffffff4a, "54de4d8f7d55124fe0b7e090a388ba632686ceba766cfe7d769f1e5a76d683a9dc7b6989ef9c4058d3752b36dbcca2ec86ec5b2ddc68e74163eb6fe657a80f17efda1cdf90835e06a062ef0267d94bad0d4c26268f44c63e116281b9a33fd004a3402718a43843dde966fa55b8a91b4cb2362979e53e7bb7767a3c3eda29428c80d27a4dd5bd7f8ddac18bde473c595f3a448d7d5f9f39fe1fbde9e7fcdf4e027cce78a0e5b0d3b8e516abf457af9858a46566"}, {0xd0, 0x108, 0x457, "e2a90e5fd950898f56693112411ef391f922ee376a34ec6fc365c4e733352269af627c90e86de5d674c5fd2b8cd5060324ebfe08d408ff609e10facc379b55e65c32715737f2a7711cddb4e18bb8a999e0b161ad7b46ecef697c57b9902bd130aed3b87be6d896a830560bfe457537dbc9ae458d05c7b2a3e9dd71dd582d811f5875e765e3e6072758cb51d033e11a566d6f788e9259ba32e03b3f9255dbff4edf1094bfe0a8b39e3596c8a05c414edc8a201412b4d98f0d97859168cf"}, {0xf0, 0x101, 0x1, "b844ff5275387522027b5757a89548f448d160ebcb850ea59c388b4fb8d7ef5deaa871d725ec88b7e84c918e2dc69d63079308044381d8fc5d3b8a7c7b10d6cf0059b7609d5ee41c16e0e3997e283f6b61b0573f56ad3da2f890356aea3e37de402eb057407255bf3b42afb9726dbb0a0a0d88e2b83c80b2909106d429e5c374d154e7dbd0b950a99699866be9c7802ef63f48b7bd2d767c1b083fcdc0ccb737b08cda2ddc6a724aba039178ce18cbfe2d308f884052a762377734d80066cb74dd79f9f040f3a336e17fd3b978cf624ba2bd1b9356a07c946f34"}, {0x30, 0x88, 0x20, "0f3f26d4adcb0b2bdf262a3d54f03f76dfea2a58f4a904aef53162"}], 0x12c8}}], 0x3, 0x20048001) 01:12:40 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x29}, 0x20) 01:12:40 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x6c}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1083.269293][ T4499] BPF:[1] FUNC_PROTO (anon) [ 1083.273960][ T4499] BPF:return=0 args=( [ 1083.279238][ T4499] BPF:0 [ 1083.282100][ T4499] BPF:, vararg [ 1083.286704][ T4499] BPF:) [ 1083.289473][ T4499] BPF: [ 1083.292232][ T4499] BPF:Invalid arg#2 [ 1083.297012][ T4499] BPF: [ 1083.297012][ T4499] 01:12:40 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x7a00}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1083.516895][ T4524] hfsplus: gid requires an argument [ 1083.522120][ T4524] hfsplus: unable to parse mount options [ 1083.539113][ T4525] BPF:[1] FUNC_PROTO (anon) [ 1083.543780][ T4525] BPF:return=0 args=( [ 1083.548930][ T4525] BPF:0 [ 1083.551793][ T4525] BPF:, vararg [ 1083.556552][ T4525] BPF:) [ 1083.559324][ T4525] BPF: [ 1083.560207][ T4529] BPF:[1] FUNC_PROTO (anon) 01:12:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x6c, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:41 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x2b}, 0x20) [ 1083.562091][ T4525] BPF:Invalid arg#2 [ 1083.562103][ T4525] BPF: [ 1083.562103][ T4525] [ 1083.577526][ T4529] BPF:return=0 args=( [ 1083.581521][ T4529] BPF:0 [ 1083.584370][ T4529] BPF:, vararg [ 1083.588963][ T4529] BPF:) [ 1083.591738][ T4529] BPF: [ 1083.594502][ T4529] BPF:Invalid arg#2 [ 1083.599514][ T4529] BPF: [ 1083.599514][ T4529] 01:12:41 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x74}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1083.727301][ T4544] BPF:[1] FUNC_PROTO (anon) [ 1083.731958][ T4544] BPF:return=0 args=( [ 1083.737257][ T4544] BPF:0 (invalid-name-offset) [ 1083.742099][ T4544] BPF:, 0 [ 1083.746520][ T4544] BPF:, vararg [ 1083.749987][ T4544] BPF:) [ 1083.752753][ T4544] BPF: [ 1083.756711][ T4544] BPF:Invalid arg#1 [ 1083.760520][ T4544] BPF: [ 1083.760520][ T4544] 01:12:41 executing program 0: clone(0x4621d100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000000)={0x90, 0x5, 0x7ff}) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1083.783305][ T4545] BPF:[1] FUNC_PROTO (anon) [ 1083.789338][ T4545] BPF:return=0 args=( [ 1083.793334][ T4545] BPF:0 (invalid-name-offset) [ 1083.799408][ T4545] BPF:, 0 [ 1083.802441][ T4545] BPF:, vararg [ 1083.806822][ T4545] BPF:) [ 1083.809604][ T4545] BPF: [ 1083.812680][ T4545] BPF:Invalid arg#1 [ 1083.817703][ T4545] BPF: [ 1083.817703][ T4545] 01:12:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1, @ANYBLOB=',\x00']) 01:12:41 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x2f}, 0x20) [ 1084.018575][ T4564] device vlan1289 entered promiscuous mode 01:12:41 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xd200}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:41 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f0000000300)={r2}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1084.095328][ T4579] BPF:[1] FUNC_PROTO (anon) [ 1084.099987][ T4579] BPF:return=0 args=( [ 1084.103980][ T4579] BPF:0 [ 1084.108873][ T4579] BPF:, vararg [ 1084.112258][ T4579] BPF:) [ 1084.120100][ T4579] BPF: [ 1084.122876][ T4579] BPF:Invalid arg#2 [ 1084.126738][ T4579] BPF: [ 1084.126738][ T4579] 01:12:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x74, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:41 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x7a}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1084.297480][ T4586] hfsplus: unable to parse mount options [ 1084.319762][ T4594] BPF:[1] FUNC_PROTO (anon) [ 1084.324641][ T4594] BPF:return=0 args=( [ 1084.328634][ T4594] BPF:0 (invalid-name-offset) [ 1084.333319][ T4594] BPF:, 0 [ 1084.338788][ T4594] BPF:, vararg [ 1084.342168][ T4594] BPF:) [ 1084.344979][ T4594] BPF: [ 1084.347749][ T4594] BPF:Invalid arg#1 [ 1084.351559][ T4594] BPF: [ 1084.351559][ T4594] [ 1084.367841][ T4595] BPF:[1] FUNC_PROTO (anon) [ 1084.372487][ T4595] BPF:return=0 args=( [ 1084.378729][ T4595] BPF:0 (invalid-name-offset) [ 1084.383422][ T4595] BPF:, 0 [ 1084.387785][ T4595] BPF:, vararg [ 1084.391178][ T4595] BPF:) [ 1084.393937][ T4595] BPF: [ 1084.397886][ T4595] BPF:Invalid arg#1 [ 1084.401798][ T4595] BPF: [ 1084.401798][ T4595] [ 1084.422458][ T4602] hfsplus: unable to parse mount options 01:12:41 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xfffff}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1084.783526][ T4618] BPF:[1] FUNC_PROTO (anon) [ 1084.790628][ T4618] BPF:return=0 args=( [ 1084.795766][ T4618] BPF:0 [ 1084.798712][ T4618] BPF:, vararg [ 1084.802175][ T4618] BPF:) [ 1084.806171][ T4618] BPF: [ 1084.808946][ T4618] BPF:Invalid arg#2 [ 1084.812760][ T4618] BPF: [ 1084.812760][ T4618] [ 1084.825745][ T4623] BPF:[1] FUNC_PROTO (anon) [ 1084.830353][ T4623] BPF:return=0 args=( [ 1084.834332][ T4623] BPF:0 [ 1084.839716][ T4623] BPF:, vararg [ 1084.843101][ T4623] BPF:) [ 1084.847247][ T4623] BPF: [ 1084.850013][ T4623] BPF:Invalid arg#2 [ 1084.853813][ T4623] BPF: [ 1084.853813][ T4623] [ 1084.867182][ T4626] BPF:[1] FUNC_PROTO (anon) [ 1084.871817][ T4626] BPF:return=0 args=( [ 1084.877174][ T4626] BPF:0 (invalid-name-offset) 01:12:42 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000000)={0x146, 0x9, 0x80000000}) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:12:42 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x32}, 0x20) [ 1084.882383][ T4626] BPF:, 0 [ 1084.886682][ T4626] BPF:, vararg [ 1084.890064][ T4626] BPF:) [ 1084.892827][ T4626] BPF: [ 1084.896780][ T4626] BPF:Invalid arg#1 [ 1084.900593][ T4626] BPF: [ 1084.900593][ T4626] 01:12:42 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0xd2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1084.961093][ T4639] device vlan1290 entered promiscuous mode 01:12:42 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xffffff}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:12:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x7a, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:42 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x34}, 0x20) [ 1085.309843][ T4660] hfsplus: gid requires an argument [ 1085.320918][ T4660] hfsplus: unable to parse mount options [ 1085.328532][ T4663] BPF:[1] FUNC_PROTO (anon) [ 1085.333151][ T4663] BPF:return=0 args=( [ 1085.339180][ T4663] BPF:0 (invalid-name-offset) [ 1085.343866][ T4663] BPF:, 0 [ 1085.348284][ T4663] BPF:, vararg [ 1085.351771][ T4663] BPF:) [ 1085.354601][ T4663] BPF: [ 1085.357366][ T4663] BPF:Invalid arg#1 [ 1085.361258][ T4663] BPF: [ 1085.361258][ T4663] [ 1085.376950][ T4668] BPF:[1] FUNC_PROTO (anon) [ 1085.381558][ T4668] BPF:return=0 args=( [ 1085.386622][ T4668] BPF:0 (invalid-name-offset) [ 1085.391314][ T4668] BPF:, 0 [ 1085.394335][ T4668] BPF:, vararg [ 1085.399013][ T4668] BPF:) [ 1085.401786][ T4668] BPF: [ 1085.405780][ T4668] BPF:Invalid arg#1 [ 1085.409587][ T4668] BPF: [ 1085.409587][ T4668] [ 1085.447862][ T4676] hfsplus: gid requires an argument [ 1085.453077][ T4669] BPF:[1] FUNC_PROTO (anon) [ 1085.453121][ T4669] BPF:return=0 args=( [ 1085.453133][ T4669] BPF:0 [ 1085.453142][ T4669] BPF:, vararg [ 1085.453152][ T4669] BPF:) [ 1085.453161][ T4669] BPF: [ 1085.453171][ T4669] BPF:Invalid arg#2 [ 1085.453181][ T4669] BPF: [ 1085.453181][ T4669] [ 1085.459514][ T4669] BPF:[1] FUNC_PROTO (anon) [ 1085.463303][ T4676] hfsplus: unable to parse mount options 01:12:43 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x1000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1085.499240][ T4669] BPF:return=0 args=( [ 1085.503224][ T4669] BPF:0 [ 1085.507158][ T4669] BPF:, vararg [ 1085.510537][ T4669] BPF:) [ 1085.513298][ T4669] BPF: [ 1085.517324][ T4669] BPF:Invalid arg#2 [ 1085.521140][ T4669] BPF: [ 1085.521140][ T4669] 01:12:43 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x300}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:43 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x3fe}, 0x20) [ 1086.007815][ T4692] device vlan1291 entered promiscuous mode 01:12:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f0000001c80)=ANY=[@ANYBLOB="2c0000002c0010002abd7000ffdbdf25000000007d78a7a4cfd722dda43c7ff9e625e91e0947eb558192901865623c78ba4c05cae54c19a3926019241efc74bb2154d35e2a932c633eacea8a84247213679de53ddff28213d9be6d619072adebcefc75034b020dd2275a6bb015d11d42c8a309290ffc8bf4cb711709e04b00ee93a32eaaa2c98ec1545518667eb9a4f7b2318185942158fe13f4a8554ed3cc64b8714fba", @ANYRES32=r3, @ANYBLOB="0300f3ff01000a00030007000600050007290000"], 0x2c}, 0x1, 0x0, 0x0, 0x94}, 0x800) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) r7 = socket$packet(0x11, 0x2, 0x300) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000016c0)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r6, @ANYBLOB="a2056b8400000000ad27ba0a1b456d4fee9caaa3fee8d090fa53aa4642354ae14e"], 0x20}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r7, 0x89fa, &(0x7f0000000700)={'syztnl0\x00', &(0x7f0000000680)={'ip6_vti0\x00', r6, 0x29, 0x4, 0x9, 0x1f, 0x48, @dev={0xfe, 0x80, '\x00', 0x12}, @dev={0xfe, 0x80, '\x00', 0x34}, 0x7800, 0x7, 0x40, 0xfffffe00}}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000840)={&(0x7f0000000740)={0xc8, 0x0, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x40000}, 0x8084) sendmsg$inet6(r2, &(0x7f0000001c00)={&(0x7f0000000400)={0xa, 0x4e20, 0x302e, @local, 0x2a}, 0x1c, &(0x7f0000001a40)=[{&(0x7f0000000500)="5340fac4dd79f43983fc38edbce60c247513d6bebd1a76b180b9e5d98c08ac8c49c92ae634a77aa2b69c0dde24d3074d9d4906b14c4fd5215546700568078fdc642f1f24fb1314991e93430dfb8b3259a6a0e65b1b38b4e8543ac1fafc26bd7f368f2fc269dffe9f2d27ff9039f19a83ab39d4baec8474b3d6882c764c17d6add790b2967a20482c7b311e8474fce8df444dda", 0x93}, {&(0x7f0000000440)="dbb8b3e5aa937940ba6c9b437cc0de2a58f788e3a4a15778940c342c7745af01f249b4ad5724993993b93fa66eab30a0e6597837bf08e5adf2", 0x39}, {&(0x7f00000005c0)="9ce2c499c5f7e8d0fa1dee184ab09a85b7ad9c2343ef1441ba61caaa18c890d30cd24bb6eae0ca80a94c63d1a3b993dc889f671b2b8f4f1b1560df87d820fbcbbee50f4f99eb868b3c0551e874074a337158b8d5578a98fc83c1c9ea845848f21020042ca0e2c2fc2b46c8b88d3ce0ce1d1f556396d86955e18fcd3583dc9759233b59962096cfa3240cad6cf92a4a9c224b45c05fff9b8e4461cf6828c79c91488b092761cf19675a84846d508bb44d6286cae6e60ef0aa355ecf4bf25f9ce69c78e59726241b24bfc751", 0xcb}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f00000016c0)}, {&(0x7f0000001700)="7ee83a874a9f10807d1d80840eafe5cdf52f2ceb26128e416feb3ca759c5f3f8960ec1ae16a86e1c1a322e7233ac7866452ad47ec6bf9ebb1523a5f334d18b1f2c5dcdc28bf0520094e5554c", 0x4c}, {&(0x7f0000001780)="1609d7a5f8a5ac1493b0e63b45d8807e8bc23ca59112f94fa772de3b4fd6acda39a71d2e12ea90ea3b898ec141a327a8f88e3319505df43b58cf6c469fc7ae514d149199bb3f6920351766657f8a60afb4284cc1d905ddb6ac07de8fdc54069e276832885f6d6bce0e720f98d96a1762135ce1c3fb4a1f115e211bbc5b3349716f1a30e46231115118a59adb51559ac610740d84686992e436d7d7ae854e091bbafb204d93a83fcdaebd5eb6a514184046c9a0dac5bcb186276eda2846dd5b64972a4b876d49b1aeee230a2b0a82a74c4da72d6e886c2df098cc62de81366d6e3b22314481ddaa366f9cb35ddab8ec2f46241e", 0xf3}, {&(0x7f0000001880)="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", 0xfb}, {&(0x7f0000001980)="c265429f237e16eb6571f9d3a130a7618851669a47e9dc309a9ad3cc99fece499b74a08618496d5c9b547df861a7ebcf744a31e95c15bc416cb425c3c2451d2da36a6a1f00e757ff3103105177eaf244f515037847bc65cf2e1f45143d044a879f9e1cab9a9b9c307a07cbb7c78c6f4bdb1a107a06c9d593d7e23586c56231a0cd6133af5daa3da0fe23cf10db51312d7a96c897531ec95e378727a258f736590801a6350c180772d9208f346ce9d0afa74216557cd41095c9fe5197", 0xbc}], 0x9, &(0x7f0000001b00)=[@rthdr={{0x58, 0x29, 0x39, {0x5e, 0x8, 0x2, 0x1, 0x0, [@dev={0xfe, 0x80, '\x00', 0x26}, @dev={0xfe, 0x80, '\x00', 0x2f}, @remote, @dev={0xfe, 0x80, '\x00', 0x2d}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, r6}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x709f}}, @rthdrdstopts={{0x30, 0x29, 0x37, {0x0, 0x2, '\x00', [@hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @loopback}}]}}}], 0xc8}, 0x40080) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000100)) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000100)) connect$vsock_stream(r9, &(0x7f0000001c40)={0x28, 0x0, 0xffffffff}, 0x10) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000040)='veth0_to_hsr\x00') syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="9238645a5c61ba0000000000c3520000000000", @ANYRESHEX=r1, @ANYBLOB=',\x00']) ioctl$F2FS_IOC_GET_FEATURES(r2, 0x8004f50c, &(0x7f0000000080)) 01:12:43 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x38, 0xfff, 0xda, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:12:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x84, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:43 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x7ffff}, 0x20) [ 1086.421088][ T4707] BPF:[1] FUNC_PROTO (anon) [ 1086.426887][ T4707] BPF:return=0 args=( [ 1086.430894][ T4707] BPF:0 [ 1086.433751][ T4707] BPF:, vararg [ 1086.438672][ T4707] BPF:) [ 1086.441462][ T4707] BPF: [ 1086.444230][ T4707] BPF:Invalid arg#2 [ 1086.446654][ T4711] BPF:[1] FUNC_PROTO (anon) [ 1086.448105][ T4707] BPF: [ 1086.448105][ T4707] [ 1086.452642][ T4711] BPF:return=0 args=( [ 1086.463804][ T4711] BPF:0 (invalid-name-offset) [ 1086.469923][ T4711] BPF:, 0 [ 1086.472967][ T4711] BPF:, vararg [ 1086.476389][ T4711] BPF:) [ 1086.479163][ T4711] BPF: [ 1086.479966][ T4714] BPF:[1] FUNC_PROTO (anon) [ 1086.481950][ T4711] BPF:Invalid arg#1 [ 1086.487598][ T4714] BPF:return=0 args=( [ 1086.490351][ T4711] BPF: [ 1086.490351][ T4711] [ 1086.495250][ T4714] BPF:0 [ 1086.502010][ T4714] BPF:, vararg [ 1086.506643][ T4714] BPF:) [ 1086.509411][ T4714] BPF: [ 1086.512168][ T4714] BPF:Invalid arg#2 [ 1086.517254][ T4714] BPF: [ 1086.517254][ T4714] [ 1086.543503][ T4715] BPF:[1] FUNC_PROTO (anon) [ 1086.548178][ T4715] BPF:return=0 args=( [ 1086.552161][ T4715] BPF:0 (invalid-name-offset) [ 1086.556910][ T4715] BPF:, 0 [ 1086.559935][ T4715] BPF:, vararg [ 1086.563307][ T4715] BPF:) [ 1086.566140][ T4715] BPF: [ 1086.568902][ T4715] BPF:Invalid arg#1 [ 1086.572705][ T4715] BPF: [ 1086.572705][ T4715] [ 1086.770876][ T4739] device vlan1292 entered promiscuous mode 01:12:44 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) getpid() r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0xffff7fff}}, './file0\x00'}) r5 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r5, 0xc00c642d, &(0x7f0000000100)={r6}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r4, 0xc00464b4, &(0x7f0000000140)={r6}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:12:44 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x500}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:44 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x2) [ 1086.816511][ T4742] hfsplus: unable to parse mount options 01:12:44 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x2000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1087.040586][ T4760] hfsplus: unable to parse mount options 01:12:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x9d, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) r2 = syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) r3 = pidfd_getfd(0xffffffffffffffff, r2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) 01:12:45 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x3) [ 1087.582385][ T4762] BPF:[1] FUNC_PROTO (anon) [ 1087.589231][ T4762] BPF:return=0 args=( [ 1087.593235][ T4762] BPF:0 [ 1087.597370][ T4762] BPF:, vararg [ 1087.600968][ T4762] BPF:) [ 1087.603737][ T4762] BPF: [ 1087.607683][ T4762] BPF:Invalid arg#2 [ 1087.611503][ T4762] BPF: [ 1087.611503][ T4762] 01:12:45 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x600}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1087.769409][ T4762] BPF:[1] FUNC_PROTO (anon) [ 1087.774074][ T4762] BPF:return=0 args=( [ 1087.779271][ T4762] BPF:0 [ 1087.782144][ T4762] BPF:, vararg [ 1087.786741][ T4762] BPF:) [ 1087.789512][ T4762] BPF: [ 1087.792282][ T4762] BPF:Invalid arg#2 [ 1087.797394][ T4762] BPF: [ 1087.797394][ T4762] [ 1088.329691][ T4791] BPF:[1] FUNC_PROTO (anon) [ 1088.335425][ T4791] BPF:return=0 args=( [ 1088.339427][ T4791] BPF:0 (invalid-name-offset) [ 1088.344107][ T4791] BPF:, 0 [ 1088.348245][ T4791] BPF:, vararg [ 1088.351617][ T4791] BPF:) [ 1088.355675][ T4791] BPF: [ 1088.358444][ T4791] BPF:Invalid arg#1 [ 1088.362279][ T4791] BPF: [ 1088.362279][ T4791] [ 1088.371534][ T4793] BPF:[1] FUNC_PROTO (anon) 01:12:45 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1088.377497][ T4793] BPF:return=0 args=( [ 1088.381485][ T4793] BPF:0 (invalid-name-offset) [ 1088.387521][ T4793] BPF:, 0 [ 1088.390558][ T4793] BPF:, vararg [ 1088.393924][ T4793] BPF:) [ 1088.398211][ T4793] BPF: [ 1088.400982][ T4793] BPF:Invalid arg#1 [ 1088.406033][ T4793] BPF: [ 1088.406033][ T4793] [ 1088.456118][ T4798] device vlan1293 entered promiscuous mode [ 1088.479151][ T4797] hfsplus: gid requires an argument [ 1088.485592][ T4797] hfsplus: unable to parse mount options 01:12:46 executing program 0: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x20b000) recvmmsg(0xffffffffffffffff, &(0x7f0000006c00)=[{{&(0x7f0000000800)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000000880)=""/204, 0xcc}, {&(0x7f0000000980)=""/203, 0xcb}, {&(0x7f0000000a80)=""/4096, 0x1000}, {&(0x7f0000001a80)=""/75, 0x4b}, {&(0x7f0000001b00)=""/11, 0xb}], 0x5, &(0x7f0000001bc0)=""/235, 0xeb}, 0x7}, {{&(0x7f0000001cc0)=@nfc_llcp, 0x80, &(0x7f0000002140)=[{&(0x7f0000001d40)=""/122, 0x7a}, {&(0x7f0000001dc0)=""/31, 0x1f}, {&(0x7f0000001e00)=""/11, 0xb}, {&(0x7f0000001e40)=""/247, 0xf7}, {&(0x7f0000001f40)=""/251, 0xfb}, {&(0x7f0000002040)=""/211, 0xd3}], 0x6, &(0x7f00000021c0)=""/59, 0x3b}, 0x22e}, {{0x0, 0x0, &(0x7f00000034c0)=[{&(0x7f0000002200)=""/83, 0x53}, {&(0x7f0000002280)=""/125, 0x7d}, {&(0x7f0000002300)=""/87, 0x57}, {&(0x7f0000002380)=""/175, 0xaf}, {&(0x7f0000002440)=""/62, 0x3e}, {&(0x7f0000002480)=""/4096, 0x1000}, {&(0x7f0000003480)=""/55, 0x37}], 0x7}, 0x407}, {{0x0, 0x0, &(0x7f0000003740)=[{&(0x7f0000003540)=""/224, 0xe0}, {&(0x7f0000003640)=""/56, 0x38}, {&(0x7f0000003680)=""/159, 0x9f}], 0x3, &(0x7f0000003780)=""/53, 0x35}, 0x9}, {{&(0x7f00000037c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x80, &(0x7f00000039c0)=[{&(0x7f0000003840)=""/117, 0x75}, {&(0x7f00000038c0)=""/242, 0xf2}], 0x2, &(0x7f0000003a00)=""/249, 0xf9}, 0x9}, {{&(0x7f0000003b00)=@nfc_llcp, 0x80, &(0x7f0000004cc0)=[{&(0x7f0000003b80)=""/86, 0x56}, {&(0x7f0000003c00)=""/141, 0x8d}, {&(0x7f0000003cc0)=""/4096, 0x1000}], 0x3, &(0x7f0000004d00)=""/113, 0x71}, 0x6}, {{0x0, 0x0, &(0x7f0000004ec0)=[{&(0x7f0000004d80)=""/160, 0xa0}, {&(0x7f0000004e40)=""/98, 0x62}], 0x2, &(0x7f0000004f00)=""/73, 0x49}, 0x7}, {{&(0x7f0000004f80)=@can, 0x80, &(0x7f0000005280)=[{&(0x7f0000005000)=""/166, 0xa6}, {&(0x7f00000050c0)=""/187, 0xbb}, {&(0x7f0000005180)=""/219, 0xdb}], 0x3, &(0x7f00000052c0)=""/4096, 0x1000}, 0x3f}, {{&(0x7f00000062c0)=@ax25={{0x3, @netrom}, [@remote, @netrom, @rose, @default, @bcast, @netrom]}, 0x80, &(0x7f0000006600)=[{&(0x7f0000006340)=""/151, 0x97}, {&(0x7f0000006400)=""/190, 0xbe}, {&(0x7f00000064c0)=""/181, 0xb5}, {&(0x7f0000006580)=""/100, 0x64}], 0x4, &(0x7f0000006640)=""/215, 0xd7}, 0x1}, {{&(0x7f0000006740)=@caif=@rfm, 0x80, &(0x7f0000006a80)=[{&(0x7f00000067c0)=""/25, 0x19}, {&(0x7f0000006800)=""/139, 0x8b}, {&(0x7f00000068c0)=""/125, 0x7d}, {&(0x7f0000006940)}, {&(0x7f0000006980)=""/123, 0x7b}, {&(0x7f0000006a00)=""/4, 0x4}, {&(0x7f0000006a40)=""/39, 0x27}], 0x7, &(0x7f0000006b00)=""/200, 0xc8}, 0xcf5b}], 0xa, 0x2000, &(0x7f0000006e80)={0x77359400}) ioctl$SNDCTL_DSP_SYNC(0xffffffffffffffff, 0x5001, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2000000, &(0x7f00000001c0)="227e413d5a3029a64b6ae16f49b845ce51128e508376370b3acb32dcc44752c7651cd8b310d4156ea880c0a00b09aed027e0d6d1eb7c28d2eeadd502c6d37161adfa8b04d35892642fb5139baceb693fcc09c110888ba8fd9d94a97cb6ff5e14b6f1838f7eff79bc8274568f760bf49f54b691eeb8badb3040af418ecaf70b94e79a3c938b551f83556d296fc6f672e0e173b70969e1386558837f98ff9bec7622cbf9eb99c173fade1a5ea5", &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000340)="aff02a8623af19d8952cfbe0a5d0fa082b3258d233ec8a180218e8208a321b857044c77bd1702058ff42158f8edb591bc269f1676e72ed10a618c5ccc8e273764ef3d6599b65e7c6b83dfba1abc8ea5d0998f48e0ec6d4615c86854cd06a9be389f709009c0f0e7da5e23bdfe88f307df1fa2544abcb215ae63782177cbbe1f7ac437219fa4310687775304fe448255b126d3d54") r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) clone(0x200000, &(0x7f0000000580)="f0c4963c412821c77ce3ec5c8014547880fde586be972f8d90cc2dfd4c6801d24361257e1237d7d36913a34a20fc07ec4fa8b36000f0223ad8a7e8a6d7e98dc52f0cfd378e0e14a7ff737e517b91cb8bf4b3fc16c6f03e6898089dcf19d4adbb3d84c5dbe26e6dfb12a227b412bfa709316f478ac6ad68169f3ffd6dd22fc24a5a46590980", &(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)="6e1d6641ac34e033467448f1981c44815f9f8ceb09323210da5244b487b42f27083649669669f36a3d295da100943bbea319b69772d11fc279587f80306b6854380dbb9cd6bb8bd13423aae31aca47aa576778aac223a6beecfbf0ce4795d1d597630ad4e254db43660b6fe82cbe1f7933d6fd7452fb410d6a8793ddcd7fed8dcdc9a13d85b96641418f02d3df382cc0cf9d1fdc05365c4af60c259d7dd59ec775d504138670184f1574b9bb4e3c109a51c5c8bdbf42dc32d54b23159cf38561cd64519bc8cad0c25187c5ad0e4194fddedcb470") r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000007c0)={0x20, 0x3, 0x2}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r4}) clone(0x52000, &(0x7f0000000280)="93afd63c04e0517cf9c692b6176444ecb0c35bf1e1e3c9f8269fdfe5a61136a8a806c71d6f460bb44f3aa817653d313d217e9dc23befe22d98c314abd04b89267babc3df3c0b93448a8d1e002dedfd", &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="7fe50c0115ba3701552108ac144b4155a96aa3e1f72892da49ac3e8b156cb0bc1d5e407c9bb51068e0f233f6071a0e25a31bff28b590276773e264056e0092081a3aa2cb122309f262b9d5e040fdca12fda12bc996d7cf17c282e318b77cd7d99c149e3c9465feb61e723ab7aa510692ca87985f2dc0936045e0410d25eacbefccd7015ae0f2047fb497bc1874ba3f5bb73eec5deecf7634855d6d5f088dd1ffdc2f628840a30db572d3ae1bb4e8d916c1dc4970028a892d75507e8b1ee5c1658c885789883492c492dbac96b316df34a4f2b8df66cf1fa085b21ae578cfe79def5ac234863de77d192b10a29fce7828") ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:12:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0xa3, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:46 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x4) [ 1088.723447][ T4814] BPF:[1] FUNC_PROTO (anon) [ 1088.729502][ T4814] BPF:return=0 args=( [ 1088.733496][ T4814] BPF:0 [ 1088.737602][ T4814] BPF:, vararg [ 1088.740982][ T4814] BPF:) [ 1088.743747][ T4814] BPF: [ 1088.746557][ T4814] BPF:Invalid arg#2 [ 1088.750360][ T4814] BPF: [ 1088.750360][ T4814] [ 1088.769547][ T4815] BPF:[1] FUNC_PROTO (anon) [ 1088.775533][ T4815] BPF:return=0 args=( [ 1088.779071][ T4817] BPF:[1] FUNC_PROTO (anon) [ 1088.779516][ T4815] BPF:0 [ 1088.785236][ T4817] BPF:return=0 args=( [ 1088.787004][ T4815] BPF:, vararg [ 1088.790968][ T4817] BPF:0 (invalid-name-offset) [ 1088.794379][ T4815] BPF:) [ 1088.799036][ T4817] BPF:, 0 [ 1088.801774][ T4815] BPF: [ 1088.806741][ T4817] BPF:, vararg [ 1088.807555][ T4815] BPF:Invalid arg#2 [ 1088.810906][ T4817] BPF:) [ 1088.814723][ T4815] BPF: [ 1088.814723][ T4815] [ 1088.823450][ T4817] BPF: [ 1088.827202][ T4817] BPF:Invalid arg#1 [ 1088.831240][ T4817] BPF: [ 1088.831240][ T4817] [ 1088.851442][ T4822] BPF:[1] FUNC_PROTO (anon) [ 1088.858743][ T4822] BPF:return=0 args=( [ 1088.862732][ T4822] BPF:0 (invalid-name-offset) [ 1088.868807][ T4822] BPF:, 0 [ 1088.871838][ T4822] BPF:, vararg [ 1088.876289][ T4822] BPF:) [ 1088.879055][ T4822] BPF: [ 1088.881816][ T4822] BPF:Invalid arg#1 [ 1088.887183][ T4822] BPF: [ 1088.887183][ T4822] 01:12:46 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x700}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:46 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1089.251481][ T4836] device vlan1294 entered promiscuous mode 01:12:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x202) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8, 0x0, 0x0}) r4 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r4, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r4, 0xc00464b4, &(0x7f00000000c0)={r3}) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r1, @ANYBLOB="1b00"]) 01:12:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0xed, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1089.429520][ T4850] BPF:[1] FUNC_PROTO (anon) [ 1089.435289][ T4850] BPF:return=0 args=( [ 1089.439280][ T4850] BPF:0 (invalid-name-offset) [ 1089.444420][ T4850] BPF:, 0 [ 1089.447451][ T4850] BPF:, vararg [ 1089.450823][ T4850] BPF:) [ 1089.453586][ T4850] BPF: [ 1089.458845][ T4850] BPF:Invalid arg#1 [ 1089.462752][ T4850] BPF: [ 1089.462752][ T4850] [ 1089.472369][ T4848] BPF:[1] FUNC_PROTO (anon) [ 1089.482361][ T4848] BPF:return=0 args=( [ 1089.486417][ T4848] BPF:0 [ 1089.489268][ T4848] BPF:, vararg [ 1089.492641][ T4848] BPF:) [ 1089.495479][ T4848] BPF: [ 1089.498260][ T4848] BPF:Invalid arg#2 [ 1089.502066][ T4848] BPF: [ 1089.502066][ T4848] [ 1089.516477][ T4851] BPF:[1] FUNC_PROTO (anon) [ 1089.521121][ T4851] BPF:return=0 args=( [ 1089.526117][ T4851] BPF:0 (invalid-name-offset) 01:12:47 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x5) [ 1089.530806][ T4851] BPF:, 0 [ 1089.533826][ T4851] BPF:, vararg [ 1089.538460][ T4851] BPF:) [ 1089.541272][ T4851] BPF: [ 1089.545429][ T4851] BPF:Invalid arg#1 [ 1089.549234][ T4851] BPF: [ 1089.549234][ T4851] [ 1089.571027][ T4854] BPF:[1] FUNC_PROTO (anon) [ 1089.576782][ T4854] BPF:return=0 args=( [ 1089.580781][ T4854] BPF:0 [ 1089.583629][ T4854] BPF:, vararg [ 1089.588368][ T4854] BPF:) [ 1089.591142][ T4854] BPF: [ 1089.593907][ T4854] BPF:Invalid arg#2 [ 1089.599154][ T4854] BPF: [ 1089.599154][ T4854] 01:12:47 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0xa00}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:12:47 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x5000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1091.566331][ T4873] device vlan1295 entered promiscuous mode 01:12:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0xf0, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:12:52 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x6000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1095.398356][ T4892] BPF:[1] FUNC_PROTO (anon) [ 1095.403010][ T4892] BPF:return=0 args=( [ 1095.407089][ T4892] BPF:0 (invalid-name-offset) [ 1095.411780][ T4892] BPF:, 0 [ 1095.414880][ T4892] BPF:, vararg [ 1095.418254][ T4892] BPF:) [ 1095.421016][ T4892] BPF: [ 1095.423856][ T4892] BPF:Invalid arg#1 [ 1095.427664][ T4892] BPF: [ 1095.427664][ T4892] [ 1095.441615][ T4894] BPF:[1] FUNC_PROTO (anon) [ 1095.446265][ T4894] BPF:return=0 args=( [ 1095.450254][ T4894] BPF:0 (invalid-name-offset) [ 1095.455007][ T4894] BPF:, 0 [ 1095.458028][ T4894] BPF:, vararg [ 1095.461404][ T4894] BPF:) [ 1095.464218][ T4894] BPF: [ 1095.466988][ T4894] BPF:Invalid arg#1 [ 1095.470789][ T4894] BPF: [ 1095.470789][ T4894] [ 1095.625633][ T4896] device vlan1296 entered promiscuous mode [ 1096.562297][T29983] device hsr_slave_0 left promiscuous mode [ 1096.576298][T29983] device hsr_slave_1 left promiscuous mode [ 1096.611004][T29983] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1096.620016][T29983] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1096.652157][T29983] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1096.661140][T29983] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1096.740814][T29983] device veth1_macvtap left promiscuous mode [ 1096.748063][T29983] device veth0_macvtap left promiscuous mode [ 1096.755480][T29983] device veth1_vlan left promiscuous mode [ 1096.761303][T29983] device veth0_vlan left promiscuous mode [ 1097.619410][T29983] team0 (unregistering): Port device team_slave_1 removed [ 1097.685432][T29983] team0 (unregistering): Port device team_slave_0 removed [ 1097.732532][T29983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1097.796082][T29983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1097.979798][T29983] bond0 (unregistering): Released all slaves [ 1100.799892][ T4921] chnl_net:caif_netlink_parms(): no params data found [ 1101.077200][ T4921] bridge0: port 1(bridge_slave_0) entered blocking state [ 1101.085577][ T4921] bridge0: port 1(bridge_slave_0) entered disabled state [ 1101.095674][ T4921] device bridge_slave_0 entered promiscuous mode [ 1101.106592][ T4921] bridge0: port 2(bridge_slave_1) entered blocking state [ 1101.115000][ T4921] bridge0: port 2(bridge_slave_1) entered disabled state [ 1101.123801][ T4921] device bridge_slave_1 entered promiscuous mode [ 1101.169538][ T4921] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1101.188430][ T4921] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1101.267985][ T4921] team0: Port device team_slave_0 added [ 1101.282147][ T4921] team0: Port device team_slave_1 added [ 1101.338827][ T4921] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1101.347401][ T4921] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1101.373400][ T4921] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1101.487110][ T4921] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1101.495346][ T4921] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1101.524842][ T4921] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1101.695373][ T4921] device hsr_slave_0 entered promiscuous mode [ 1101.725246][ T4921] device hsr_slave_1 entered promiscuous mode [ 1102.231344][ T4921] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1102.314473][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1102.322427][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1102.338352][ T4921] 8021q: adding VLAN 0 to HW filter on device team0 [ 1102.356673][ T2933] Bluetooth: hci0: command 0x0409 tx timeout [ 1102.374289][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1102.384809][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1102.394803][T28715] bridge0: port 1(bridge_slave_0) entered blocking state [ 1102.401872][T28715] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1102.474986][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1102.484636][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1102.495086][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1102.503562][T28715] bridge0: port 2(bridge_slave_1) entered blocking state [ 1102.510621][T28715] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1102.518714][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1102.527912][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1102.537069][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1102.547015][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1102.555888][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1102.565091][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1102.574076][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1102.582831][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1102.611998][ T4921] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1102.625684][ T4921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1102.661358][ T4921] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1102.671331][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1102.680982][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1102.690777][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1102.699383][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1102.707178][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1102.830697][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1102.841745][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1102.904955][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1102.915036][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1102.929202][ T4921] device veth0_vlan entered promiscuous mode [ 1102.938134][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1102.947539][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1102.968431][ T4921] device veth1_vlan entered promiscuous mode [ 1103.038656][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1103.048504][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1103.058276][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1103.067138][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1103.089722][ T4921] device veth0_macvtap entered promiscuous mode [ 1103.115056][ T4921] device veth1_macvtap entered promiscuous mode [ 1103.149499][ T4921] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1103.161451][ T4921] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1103.172493][ T4921] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1103.185565][ T4921] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1103.195441][ T4921] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1103.205904][ T4921] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1103.218243][ T4921] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1103.237559][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1103.247543][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1103.256472][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1103.265498][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1103.294627][ T4921] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1103.306649][ T4921] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1103.316542][ T4921] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1103.327035][ T4921] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1103.336890][ T4921] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1103.347354][ T4921] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1103.357328][ T4921] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1103.367787][ T4921] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1103.377668][ T4921] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1103.388154][ T4921] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1103.399988][ T4921] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1103.408089][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1103.417239][T28715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1103.591587][ T56] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1103.602564][ T56] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1103.615518][T32077] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1103.701105][T29983] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1103.711880][T29983] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1103.725228][T32077] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 01:13:01 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x1c00}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:01 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x6) 01:13:01 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') exit_group(0x0) clone(0x400000604e5fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x31) wait4(0x0, 0x0, 0x40000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000100)="df59f51cd5db41fb2fbbc63820aeeefc1b1970ea57e3b99280dd9067a34aedf43070e88e6fa3aab7eaefec7e3b2ec5860e11af9822ecc0a5a56ef236eada6ed072d78a019db2615e82c89370da7dd32494de5faf9f9b07b8ffebf8b3e9d3e1da72", 0x61, 0x6}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e569643d", @ANYRESHEX=r3, @ANYBLOB="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"]) r4 = socket$netlink(0x10, 0x3, 0x5) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000500)={'vxcan1\x00', 0x0}) ioctl$sock_SIOCDELRT(r1, 0x890c, &(0x7f0000000580)={0x0, @xdp={0x2c, 0xc, r6, 0x1d}, @tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x3}, 0x3}}, @sco={0x1f, @none}, 0x40, 0x0, 0x0, 0x0, 0xfc01, &(0x7f0000000540)='veth0_to_bridge\x00', 0x80000000, 0x42a9, 0x2}) r7 = gettid() process_vm_writev(r7, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) wait4(r7, &(0x7f0000000600), 0x8, &(0x7f0000000640)) sendmsg$NL80211_CMD_DEL_STATION(r4, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x802017}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)={0x68, r5, 0x10, 0x70bd27, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x4, 0x45}}}}, [@NL80211_ATTR_STA_FLAGS={0x20, 0x11, 0x0, 0x1, [@NL80211_STA_FLAG_SHORT_PREAMBLE={0x4}, @NL80211_STA_FLAG_WME={0x4}, @NL80211_STA_FLAG_TDLS_PEER={0x4}, @NL80211_STA_FLAG_SHORT_PREAMBLE={0x4}, @NL80211_STA_FLAG_TDLS_PEER={0x4}, @NL80211_STA_FLAG_AUTHORIZED={0x4}, @NL80211_STA_FLAG_TDLS_PEER={0x4}]}, @NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0x40}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x6d2d}, @NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x247}, @NL80211_ATTR_STA_SUPPORTED_RATES={0x10, 0x13, [{0x60}, {0xc}, {0x3, 0x1}, {0x2}, {0xb, 0x1}, {0x9}, {0x44}, {0x30, 0x1}, {0x16, 0x1}, {0x5d}, {0x16}, {0x36, 0x1}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x94}, 0x4004014) 01:13:01 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000000)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:13:01 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x7000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x119, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1104.039130][ T5356] BPF:[1] FUNC_PROTO (anon) [ 1104.044886][ T5356] BPF:return=0 args=( [ 1104.048878][ T5356] BPF:0 (invalid-name-offset) [ 1104.054557][ T5356] BPF:, 0 [ 1104.057596][ T5356] BPF:, vararg [ 1104.060972][ T5356] BPF:) [ 1104.065100][ T5356] BPF: [ 1104.067874][ T5356] BPF:Invalid arg#1 [ 1104.071689][ T5356] BPF: [ 1104.071689][ T5356] [ 1104.080773][ T5362] BPF:[1] FUNC_PROTO (anon) 01:13:01 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x7) [ 1104.088167][ T5362] BPF:return=0 args=( [ 1104.092177][ T5362] BPF:0 [ 1104.096380][ T5362] BPF:, vararg [ 1104.099770][ T5362] BPF:) [ 1104.102537][ T5362] BPF: [ 1104.105383][ T5362] BPF:Invalid arg#2 [ 1104.109189][ T5362] BPF: [ 1104.109189][ T5362] [ 1104.118953][ T5358] BPF:[1] FUNC_PROTO (anon) [ 1104.124651][ T5358] BPF:return=0 args=( [ 1104.128837][ T5358] BPF:0 (invalid-name-offset) [ 1104.134799][ T5358] BPF:, 0 [ 1104.137837][ T5358] BPF:, vararg [ 1104.141207][ T5358] BPF:) [ 1104.144786][ T5365] BPF:[1] FUNC_PROTO (anon) [ 1104.144801][ T5365] BPF:return=0 args=( [ 1104.144812][ T5365] BPF:0 [ 1104.144821][ T5365] BPF:, vararg [ 1104.144830][ T5365] BPF:) [ 1104.144838][ T5365] BPF: [ 1104.144847][ T5365] BPF:Invalid arg#2 [ 1104.144856][ T5365] BPF: [ 1104.144856][ T5365] [ 1104.176579][ T5358] BPF: [ 1104.179350][ T5358] BPF:Invalid arg#1 [ 1104.183201][ T5358] BPF: [ 1104.183201][ T5358] 01:13:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r1, @ANYBLOB="0000574fac2e061e5d7787e12d5059746f6bb476319ebb1c491cd2047bb12d895b3ea382a5835ebab9e5d4f0127ce57386c45b854e08dd2efcf6f504413801c403f325c2da3f4b25286bdead66d63b0d8c4f69c63efffec66dc2e812b9c85a147e27d68e87f7651a3fad1dc8b8"]) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000100)) clock_gettime(0x1, &(0x7f0000000080)={0x0, 0x0}) utimensat(r2, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)={{}, {r3, r4/1000+10000}}, 0x100) 01:13:01 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x1e00}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:01 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x8) 01:13:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x120, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:01 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x8000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1104.445558][ T2933] Bluetooth: hci0: command 0x041b tx timeout 01:13:02 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r4, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r4, 0xc01064b3, &(0x7f0000000000)={r1}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000300)={r5}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1104.542380][ T5390] BPF:[1] FUNC_PROTO (anon) [ 1104.548139][ T5390] BPF:return=0 args=( [ 1104.552144][ T5390] BPF:0 [ 1104.556445][ T5390] BPF:, vararg [ 1104.559982][ T5390] BPF:) [ 1104.563983][ T5390] BPF: [ 1104.566758][ T5390] BPF:Invalid arg#2 [ 1104.570569][ T5390] BPF: [ 1104.570569][ T5390] [ 1104.594180][ T5391] BPF:[1] FUNC_PROTO (anon) [ 1104.599246][ T5391] BPF:return=0 args=( [ 1104.605801][ T5391] BPF:0 [ 1104.608661][ T5391] BPF:, vararg [ 1104.612041][ T5391] BPF:) [ 1104.614890][ T5391] BPF: [ 1104.617659][ T5391] BPF:Invalid arg#2 [ 1104.621465][ T5391] BPF: [ 1104.621465][ T5391] 01:13:02 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x9) [ 1104.641811][ T5395] hfsplus: gid requires an argument [ 1104.648107][ T5395] hfsplus: unable to parse mount options [ 1104.741179][ T5409] device vlan1297 entered promiscuous mode [ 1104.778499][ T5416] BPF:[1] FUNC_PROTO (anon) [ 1104.785492][ T5416] BPF:return=0 args=( [ 1104.789498][ T5416] BPF:0 (invalid-name-offset) [ 1104.795639][ T5416] BPF:, 0 [ 1104.798675][ T5416] BPF:, vararg [ 1104.802391][ T5416] BPF:) [ 1104.806641][ T5416] BPF: [ 1104.809418][ T5416] BPF:Invalid arg#1 [ 1104.813293][ T5416] BPF: [ 1104.813293][ T5416] [ 1104.836908][ T5417] BPF:[1] FUNC_PROTO (anon) [ 1104.841522][ T5417] BPF:return=0 args=( [ 1104.846918][ T5417] BPF:0 (invalid-name-offset) [ 1104.851602][ T5417] BPF:, 0 [ 1104.855039][ T5412] hfsplus: gid requires an argument [ 1104.855059][ T5412] hfsplus: unable to parse mount options [ 1104.866834][ T5417] BPF:, vararg [ 1104.870212][ T5417] BPF:) [ 1104.873014][ T5417] BPF: [ 1104.875778][ T5417] BPF:Invalid arg#1 [ 1104.879580][ T5417] BPF: [ 1104.879580][ T5417] 01:13:02 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0xa) 01:13:02 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x1f00}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:02 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r3}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/ldiscs\x00', 0x0, 0x0) close_range(r1, r4, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000000)={0xc3, 0xfffffffa, 0x2}) 01:13:02 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xa000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1105.109443][ T5434] BPF:[1] FUNC_PROTO (anon) [ 1105.115325][ T5434] BPF:return=0 args=( [ 1105.119333][ T5434] BPF:0 [ 1105.122194][ T5434] BPF:, vararg [ 1105.126783][ T5434] BPF:) [ 1105.129566][ T5434] BPF: [ 1105.132334][ T5434] BPF:Invalid arg#2 [ 1105.137240][ T5434] BPF: [ 1105.137240][ T5434] [ 1105.152002][ T5436] BPF:[1] FUNC_PROTO (anon) 01:13:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x132, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1105.158073][ T5436] BPF:return=0 args=( [ 1105.162068][ T5436] BPF:0 [ 1105.164997][ T5436] BPF:, vararg [ 1105.168372][ T5436] BPF:) [ 1105.171137][ T5436] BPF: [ 1105.173943][ T5436] BPF:Invalid arg#2 [ 1105.177749][ T5436] BPF: [ 1105.177749][ T5436] 01:13:02 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x2000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:02 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0xb) 01:13:02 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x2000, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1105.340960][ T5452] BPF:[1] FUNC_PROTO (anon) [ 1105.346936][ T5452] BPF:return=0 args=( [ 1105.350939][ T5452] BPF:0 [ 1105.354924][ T5452] BPF:, vararg [ 1105.358347][ T5452] BPF:) [ 1105.361119][ T5452] BPF: [ 1105.365269][ T5452] BPF:Invalid arg#2 [ 1105.369108][ T5452] BPF: [ 1105.369108][ T5452] [ 1105.391479][ T5455] BPF:[1] FUNC_PROTO (anon) [ 1105.398046][ T5455] BPF:return=0 args=( [ 1105.402064][ T5455] BPF:0 (invalid-name-offset) [ 1105.408178][ T5455] BPF:, 0 [ 1105.411343][ T5455] BPF:, vararg [ 1105.414788][ T5455] BPF:) [ 1105.417569][ T5455] BPF: [ 1105.420338][ T5455] BPF:Invalid arg#1 [ 1105.424219][ T5455] BPF: [ 1105.424219][ T5455] [ 1105.431887][ T5453] BPF:[1] FUNC_PROTO (anon) [ 1105.437780][ T5453] BPF:return=0 args=( [ 1105.441774][ T5453] BPF:0 [ 1105.444676][ T5453] BPF:, vararg [ 1105.447861][ T5456] BPF:[1] FUNC_PROTO (anon) [ 1105.448040][ T5453] BPF:) [ 1105.448050][ T5453] BPF: [ 1105.452619][ T5456] BPF:return=0 args=( [ 1105.455414][ T5453] BPF:Invalid arg#2 [ 1105.458114][ T5456] BPF:0 (invalid-name-offset) [ 1105.462070][ T5453] BPF: [ 1105.462070][ T5453] [ 1105.479058][ T5456] BPF:, 0 [ 1105.482084][ T5456] BPF:, vararg [ 1105.486903][ T5456] BPF:) 01:13:03 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0xc) [ 1105.489672][ T5456] BPF: [ 1105.492434][ T5456] BPF:Invalid arg#1 [ 1105.497561][ T5456] BPF: [ 1105.497561][ T5456] [ 1105.636327][ T5464] device vlan1298 entered promiscuous mode [ 1105.665225][ T5476] BPF:[1] FUNC_PROTO (anon) [ 1105.669910][ T5476] BPF:return=8192 args=( [ 1105.676719][ T5476] BPF:0 (anon) [ 1105.680113][ T5476] BPF:, 0 [ 1105.683212][ T5476] BPF:, vararg 01:13:03 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x11000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:03 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0xd) 01:13:03 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x2e00}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1105.686591][ T5476] BPF:) [ 1105.689359][ T5476] BPF: [ 1105.692126][ T5476] BPF:Invalid return type [ 1105.696523][ T5476] BPF: [ 1105.696523][ T5476] 01:13:03 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0xe) 01:13:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x171, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1105.901415][ T5489] BPF:[1] FUNC_PROTO (anon) [ 1105.907444][ T5489] BPF:return=0 args=( [ 1105.911452][ T5489] BPF:0 (invalid-name-offset) [ 1105.917929][ T5489] BPF:, 0 [ 1105.920977][ T5489] BPF:, vararg [ 1105.924432][ T5489] BPF:) [ 1105.927210][ T5489] BPF: [ 1105.929079][ T5494] BPF:[1] FUNC_PROTO (anon) [ 1105.929982][ T5489] BPF:Invalid arg#1 [ 1105.929993][ T5489] BPF: [ 1105.929993][ T5489] [ 1105.945717][ T5494] BPF:return=0 args=( [ 1105.949660][ T5493] BPF:[1] FUNC_PROTO (anon) [ 1105.949716][ T5494] BPF:0 [ 1105.957003][ T5493] BPF:return=0 args=( [ 1105.959300][ T5494] BPF:, vararg [ 1105.963310][ T5493] BPF:0 (invalid-name-offset) [ 1105.963323][ T5493] BPF:, 0 [ 1105.963332][ T5493] BPF:, vararg [ 1105.963341][ T5493] BPF:) [ 1105.963350][ T5493] BPF: [ 1105.963359][ T5493] BPF:Invalid arg#1 [ 1105.963368][ T5493] BPF: [ 1105.963368][ T5493] [ 1105.996734][ T5494] BPF:) 01:13:03 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000000), 0x4, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000140)={r2}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r3, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_SG_ALLOC(r3, 0xc0106438, &(0x7f00000001c0)={0x8}) r4 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x404400) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r5}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x4, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) dup(0xffffffffffffffff) [ 1105.999522][ T5494] BPF: [ 1106.002390][ T5494] BPF:Invalid arg#2 [ 1106.007366][ T5494] BPF: [ 1106.007366][ T5494] 01:13:03 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x1f000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:03 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0xf) [ 1106.056988][ T5496] BPF:[1] FUNC_PROTO (anon) [ 1106.061635][ T5496] BPF:return=0 args=( [ 1106.066764][ T5496] BPF:0 [ 1106.069624][ T5496] BPF:, vararg [ 1106.074294][ T5496] BPF:) [ 1106.077060][ T5496] BPF: [ 1106.079815][ T5496] BPF:Invalid arg#2 [ 1106.084860][ T5496] BPF: [ 1106.084860][ T5496] 01:13:03 executing program 5: socketpair(0x2, 0x6, 0x800, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000003c0)=0x5, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000440)={{0x1, 0x1, 0x18, r2, {0xe8}}, './file0\x00'}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$smc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x40, r6, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6tnl0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x40}}, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000400)={0x3, 0x7, 0x1}) sendmsg$SMC_PNETID_GET(r4, &(0x7f0000001940)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001900)={&(0x7f0000001880)={0x54, r6, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x40002}, 0x4001) writev(r2, &(0x7f00000017c0)=[{&(0x7f0000000500)="4e43c62cfb6e60507be62d24c42f921d28f03226cacfef175c2290f81ce193a13ee1dc89e891478b3553fdca9578c2704fb2301113d74e0370d25cb5a99b896e1612989298a437f5f2038752ae6dfd23de4f82fb0031dac171fd4f33efc8e387c609441bf560659e51ff13dedae2bd9a54d45a522714dfb5b1d130eb4c94d5f9f0f401652c11fae97d95a7b6fdf6f1f3cd45e3538b18fbdcf79ab739bf28fd4a8d70cced0f5f92cfe56d59b180c7699e7e1e1a53d984f71dece7be0271e1f710ad10036be36e42cb5bfd89ede79aa753eb909e4e5274a54384cf82", 0xdb}, {&(0x7f0000000600)="c603bbaed62c9afe89bbf1a9d068319a653feb32b77ac3cc78bf1e71dda4c03aaed4265dffd9de2656eac02b8ba2994db26db9c136e7c3620002c6cfe59cccb7378a0a4087a61d8b218479b9f7c0a6ae3f013449", 0x54}, {&(0x7f0000000680)="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", 0x1000}, {&(0x7f0000001680)="db32c34aaaa97f566f49d1a9cd92e3ad1966927a942582be6d46e29037700f0cf8e7dfda7a52280fd7aaba505bcd5166c17d6c361710b52103249dc089581b659b62d9dd894f6adeff692706b4848662ad7fb3215d78490eccd6", 0x5a}, {&(0x7f0000000440)}, {&(0x7f0000001700)="c49e75ac162089948fa27f4dee2058c2171a98378655e0b6c354f8", 0x1b}, {&(0x7f0000001740)="938842bb8ff845ff4211bd37472d0aac3bdbb520f2e5b7450e9e3d8d5446073e990d376c80744f12f0e0", 0x2a}, {&(0x7f0000001780)="1df7f0cb3ae16616a19d1e16e60165185c2604c245df6f3a6794a3789f9cb6", 0x1f}], 0x8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) r9 = openat$incfs(r4, &(0x7f0000000480)='.pending_reads\x00', 0xb0400, 0x110) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r9, 0xc00464b4, &(0x7f0000001b00)={r3}) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$hfsplus(&(0x7f0000001b40), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r8}}]}) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xa3, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0)="0f7930998b570835a9407c037956abaff8e6b1881e24af204e092c85b1e2d0cd80ab00b4023038845d124c62e4915bb7c4c7c0a2989b2b12c1d8ddb2ee6fc017d5fbeb282e2a024f299c17a477c0d15c888acc3d9c0fc14e2376e48e0fa8acf79eed0a23f55e35f304b2d98667a60df0648e09f9c42f3b8addc0746da94e7ea8a66bcba46649bf8262a2b1142e3de4a1854072151171846b99c733818b9fdff772d17ef4e7aa5b6aeb375a52c2585d3d673a2309d55b3babb571e06eed11761ccf14872619fde5b7bfa4d9fb9ca6f5cb32adab24599d617173375e4e02449d46", 0xe0, 0x3371}, {&(0x7f0000000200)="221265b8150f7f8459eb1462d0d0b15fdda7cde017483a9fa0db1425c6b313db28a1079db5beb7b75bcc0bf8248f2857ff2e639281b89790249580f2", 0x3c, 0x3b67}, {&(0x7f0000000240)="fd363929f3d9fb37f6d25f55067169e6e829fc4d9840d034191b0d4868a7b91a70a927645deab52f5ef15821a1f2b95c19156499c03bccb206db976acff323181762e98da49fc7808b2930b7826d3525513faaa2aa0843bccbaf6323ebb4d80489db2d75e52bd10b112bc5872f54394ec2806455bea14983c947564dd280b114bc27b41dfb5cbcf37008f980e375aebfd7969a54e2ec613513e29ccb55ea40399c31", 0xa2, 0x8}], 0x101400, &(0x7f0000001980)=ANY=[@ANYBLOB="af5de48c073126756e695f786c6174653d302c726f6469722c756e695f786c6174653d312c757466383d312c73686f72746e616d653d77696e6e742c756e695f786c6174653d302c73686f72746e616d653d77696e39352c757466383d302c73686f72746e616d653d77696e6e742c61707072616973652c736d61636b6673726f6f743d6769642c617564302c5a088da71c2c13eb9aaf2d44db01a71d31b4a01c97c74982fdcd1230adb9a2fffa230efca456f27264c00eb7afa7a954110901686fd9ce72619d", @ANYRESDEC=r7, @ANYBLOB=',measure,\x00']) [ 1106.213911][ T5507] device vlan1299 entered promiscuous mode 01:13:03 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x10) [ 1106.291790][ T5520] BPF:[1] FUNC_PROTO (anon) [ 1106.297812][ T5520] BPF:return=0 args=( [ 1106.301815][ T5520] BPF:0 (invalid-name-offset) [ 1106.308023][ T5520] BPF:, 0 [ 1106.311061][ T5520] BPF:, vararg [ 1106.315593][ T5520] BPF:) [ 1106.318373][ T5520] BPF: [ 1106.321150][ T5520] BPF:Invalid arg#1 [ 1106.326351][ T5520] BPF: [ 1106.326351][ T5520] [ 1106.358507][ T5523] BPF:[1] FUNC_PROTO (anon) [ 1106.369928][ T5523] BPF:return=0 args=( [ 1106.375219][ T5523] BPF:0 (invalid-name-offset) [ 1106.379915][ T5523] BPF:, 0 [ 1106.384139][ T5523] BPF:, vararg [ 1106.387548][ T5523] BPF:) [ 1106.390314][ T5523] BPF: [ 1106.394207][ T5523] BPF:Invalid arg#1 [ 1106.398024][ T5523] BPF: [ 1106.398024][ T5523] [ 1106.405045][ T5522] smc: net device ip6tnl0 applied user defined pnetid SYZ2 01:13:04 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000140)={0x0, 0x0, r3}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r2, 0xc01064c7, &(0x7f0000000280)={0x6, 0x0, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) r5 = dup3(r1, r0, 0x0) clone(0x84100, &(0x7f0000000600)="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", &(0x7f00000002c0), &(0x7f0000000340), &(0x7f0000000380)="a22a3ebb0d5244fd2400cf21dffd90e904401b73c4aa087f238a15ef9b43f131fde06295dd30820aa87908f837f1ee088a24cd71abdc2ea56359918309b4e6f189956fab733eef56321e8b475b7b3aaf42fc68040b6835cd3aa8747cc62736ef3db5b8a4fc86c45fa6abcfcd34902fb4602c5fee6950a72ed68f4bb4893432f26a96b0") ioctl$DRM_IOCTL_MODE_ADDFB2(r5, 0xc06864b8, &(0x7f00000001c0)={0x6, 0x80, 0xf65, 0x2, 0x1, [0x2, 0x5, 0x24aa, 0xae3f], [0x4, 0x5, 0xfffffffa, 0xfffffffd], [0xfffffffa, 0x7ff, 0x7, 0x80], [0x7, 0x4, 0x8000000005, 0x200]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r6}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:13:04 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x20000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:04 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x4800}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1106.436042][ T5522] hfsplus: gid requires an argument [ 1106.441629][ T5522] hfsplus: unable to parse mount options 01:13:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x174, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1106.517695][ T2933] Bluetooth: hci0: command 0x040f tx timeout [ 1106.526334][ T5522] loop5: detected capacity change from 0 to 59 01:13:04 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x11) [ 1106.596281][ T5527] hfsplus: gid requires an argument [ 1106.601502][ T5527] hfsplus: unable to parse mount options [ 1106.648517][ T5556] BPF:[1] FUNC_PROTO (anon) [ 1106.654425][ T5556] BPF:return=0 args=( [ 1106.658450][ T5556] BPF:0 (invalid-name-offset) [ 1106.664545][ T5556] BPF:, 0 [ 1106.667588][ T5556] BPF:, vararg [ 1106.670962][ T5556] BPF:) [ 1106.674820][ T5556] BPF: [ 1106.677596][ T5556] BPF:Invalid arg#1 [ 1106.681400][ T5556] BPF: [ 1106.681400][ T5556] [ 1106.703606][ T5560] BPF:[1] FUNC_PROTO (anon) [ 1106.708219][ T5560] BPF:return=0 args=( [ 1106.712209][ T5560] BPF:0 (invalid-name-offset) [ 1106.718035][ T5560] BPF:, 0 [ 1106.721069][ T5560] BPF:, vararg [ 1106.725718][ T5560] BPF:) [ 1106.728923][ T5560] BPF: [ 1106.731696][ T5560] BPF:Invalid arg#1 [ 1106.736761][ T5560] BPF: [ 1106.736761][ T5560] [ 1106.810626][ T5571] BPF:[1] FUNC_PROTO (anon) [ 1106.816686][ T5571] BPF:return=0 args=( [ 1106.820692][ T5571] BPF:0 [ 1106.824669][ T5571] BPF:, vararg [ 1106.828081][ T5571] BPF:) [ 1106.830863][ T5571] BPF: [ 1106.834882][ T5571] BPF:Invalid arg#2 [ 1106.838703][ T5571] BPF: [ 1106.838703][ T5571] 01:13:04 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000140)={0x0, 0x0, r3}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r2, 0xc01064c7, &(0x7f0000000280)={0x6, 0x0, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) r5 = dup3(r1, r0, 0x0) clone(0x84100, &(0x7f0000000600)="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", &(0x7f00000002c0), &(0x7f0000000340), &(0x7f0000000380)="a22a3ebb0d5244fd2400cf21dffd90e904401b73c4aa087f238a15ef9b43f131fde06295dd30820aa87908f837f1ee088a24cd71abdc2ea56359918309b4e6f189956fab733eef56321e8b475b7b3aaf42fc68040b6835cd3aa8747cc62736ef3db5b8a4fc86c45fa6abcfcd34902fb4602c5fee6950a72ed68f4bb4893432f26a96b0") ioctl$DRM_IOCTL_MODE_ADDFB2(r5, 0xc06864b8, &(0x7f00000001c0)={0x6, 0x80, 0xf65, 0x2, 0x1, [0x2, 0x5, 0x24aa, 0xae3f], [0x4, 0x5, 0xfffffffa, 0xfffffffd], [0xfffffffa, 0x7ff, 0x7, 0x80], [0x7, 0x4, 0x8000000005, 0x200]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r6}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:13:04 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x12) [ 1106.876869][ T5570] device vlan1300 entered promiscuous mode [ 1106.895189][ T5576] BPF:[1] FUNC_PROTO (anon) [ 1106.899867][ T5576] BPF:return=0 args=( [ 1106.905193][ T5576] BPF:0 [ 1106.908057][ T5576] BPF:, vararg [ 1106.911428][ T5576] BPF:) [ 1106.915441][ T5576] BPF: [ 1106.918217][ T5576] BPF:Invalid arg#2 [ 1106.922018][ T5576] BPF: [ 1106.922018][ T5576] 01:13:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000480)=0xc) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r2) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x1, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r2}}]}) 01:13:04 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x24000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:04 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x13) 01:13:04 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x4c00}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1107.100259][ T5595] hfsplus: gid requires an argument [ 1107.107607][ T5595] hfsplus: unable to parse mount options 01:13:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x1ea, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1107.216094][ T5610] BPF:[1] FUNC_PROTO (anon) [ 1107.220751][ T5610] BPF:return=0 args=( [ 1107.226010][ T5610] BPF:0 (invalid-name-offset) [ 1107.230703][ T5610] BPF:, 0 [ 1107.235277][ T5610] BPF:, vararg [ 1107.238658][ T5610] BPF:) [ 1107.241424][ T5610] BPF: [ 1107.244258][ T5610] BPF:Invalid arg#1 [ 1107.248067][ T5610] BPF: [ 1107.248067][ T5610] 01:13:04 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000140)={0x0, 0x0, r3}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r2, 0xc01064c7, &(0x7f0000000280)={0x6, 0x0, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) r5 = dup3(r1, r0, 0x0) clone(0x84100, &(0x7f0000000600)="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", &(0x7f00000002c0), &(0x7f0000000340), &(0x7f0000000380)="a22a3ebb0d5244fd2400cf21dffd90e904401b73c4aa087f238a15ef9b43f131fde06295dd30820aa87908f837f1ee088a24cd71abdc2ea56359918309b4e6f189956fab733eef56321e8b475b7b3aaf42fc68040b6835cd3aa8747cc62736ef3db5b8a4fc86c45fa6abcfcd34902fb4602c5fee6950a72ed68f4bb4893432f26a96b0") ioctl$DRM_IOCTL_MODE_ADDFB2(r5, 0xc06864b8, &(0x7f00000001c0)={0x6, 0x80, 0xf65, 0x2, 0x1, [0x2, 0x5, 0x24aa, 0xae3f], [0x4, 0x5, 0xfffffffa, 0xfffffffd], [0xfffffffa, 0x7ff, 0x7, 0x80], [0x7, 0x4, 0x8000000005, 0x200]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r6}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1107.314877][ T5619] BPF:[1] FUNC_PROTO (anon) [ 1107.319538][ T5619] BPF:return=0 args=( [ 1107.324552][ T5619] BPF:0 [ 1107.327602][ T5619] BPF:, vararg [ 1107.330979][ T5619] BPF:) [ 1107.335022][ T5619] BPF: [ 1107.337801][ T5619] BPF:Invalid arg#2 [ 1107.341608][ T5619] BPF: [ 1107.341608][ T5619] [ 1107.359472][ T5622] BPF:[1] FUNC_PROTO (anon) 01:13:04 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x14) [ 1107.365409][ T5622] BPF:return=0 args=( [ 1107.369404][ T5622] BPF:0 [ 1107.372256][ T5622] BPF:, vararg [ 1107.377002][ T5622] BPF:) [ 1107.379795][ T5622] BPF: [ 1107.382615][ T5622] BPF:Invalid arg#2 [ 1107.386420][ T5622] BPF: [ 1107.386420][ T5622] 01:13:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRESHEX=r1, @ANYBLOB=',\x00']) [ 1107.476400][ T5634] device vlan1301 entered promiscuous mode 01:13:05 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x26000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:05 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x5f00}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:05 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x15) 01:13:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x20a, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:05 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000140)={0x2}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0xc8e41) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r3, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00464b4, &(0x7f00000001c0)={r2}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)={0x0, @adiantum, 0x0, @desc2}) r4 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r5}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) [ 1107.746304][ T5654] hfsplus: unable to find HFS+ superblock [ 1107.780543][ T5662] BPF:[1] FUNC_PROTO (anon) [ 1107.786488][ T5662] BPF:return=0 args=( [ 1107.790499][ T5662] BPF:0 (invalid-name-offset) 01:13:05 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x16) [ 1107.796894][ T5662] BPF:, 0 [ 1107.799938][ T5662] BPF:, vararg [ 1107.803359][ T5662] BPF:) [ 1107.806202][ T5662] BPF: [ 1107.808972][ T5662] BPF:Invalid arg#1 [ 1107.812828][ T5662] BPF: [ 1107.812828][ T5662] [ 1107.860606][ T5666] BPF:[1] FUNC_PROTO (anon) [ 1107.866523][ T5666] BPF:return=0 args=( [ 1107.870525][ T5666] BPF:0 (invalid-name-offset) [ 1107.875285][ T5666] BPF:, 0 [ 1107.878317][ T5666] BPF:, vararg [ 1107.881688][ T5666] BPF:) [ 1107.884501][ T5666] BPF: [ 1107.887261][ T5666] BPF:Invalid arg#1 [ 1107.891066][ T5666] BPF: [ 1107.891066][ T5666] [ 1107.923795][ T5672] BPF:[1] FUNC_PROTO (anon) [ 1107.928447][ T5672] BPF:return=0 args=( [ 1107.933772][ T5672] BPF:0 [ 1107.936634][ T5672] BPF:, vararg [ 1107.940010][ T5672] BPF:) [ 1107.944123][ T5672] BPF: [ 1107.946895][ T5672] BPF:Invalid arg#2 [ 1107.950705][ T5672] BPF: [ 1107.950705][ T5672] [ 1107.979507][ T5673] BPF:[1] FUNC_PROTO (anon) [ 1107.985319][ T5673] BPF:return=0 args=( [ 1107.989313][ T5673] BPF:0 [ 1107.992163][ T5673] BPF:, vararg [ 1107.996655][ T5673] BPF:) [ 1107.999424][ T5673] BPF: [ 1108.002179][ T5673] BPF:Invalid arg#2 [ 1108.004532][ T5688] device vlan1302 entered promiscuous mode [ 1108.007058][ T5673] BPF: [ 1108.007058][ T5673] [ 1108.028795][ T5677] hfsplus: unable to find HFS+ superblock 01:13:05 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x17) 01:13:05 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x48000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r1, @ANYBLOB='\f$']) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) r5 = socket$packet(0x11, 0x2, 0x300) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@dellink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x8401}}, 0x20}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r5, 0x89fa, &(0x7f0000000700)={'syztnl0\x00', &(0x7f0000000680)={'ip6_vti0\x00', r4, 0x29, 0x4, 0x9, 0x1f, 0x48, @dev={0xfe, 0x80, '\x00', 0x12}, @dev={0xfe, 0x80, '\x00', 0x34}, 0x7800, 0x7, 0x40, 0xfffffe00}}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000840)={&(0x7f0000000740)={0xc8, 0x0, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x40000}, 0x8084) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@gettfilter={0x4c, 0x2e, 0x400, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r4, {0x6, 0xc}, {0xc, 0x7}, {0x8, 0xffff}}, [{0x8, 0xb, 0x4}, {0x8, 0xb, 0x7f}, {0x8, 0xb, 0xbece}, {0x8, 0xb, 0x9}, {0x8, 0xb, 0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000040}, 0x840) 01:13:05 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x6000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:05 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000140)={0x2}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0xc8e41) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r3, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00464b4, &(0x7f00000001c0)={r2}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)={0x0, @adiantum, 0x0, @desc2}) r4 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r5}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:13:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x216, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:05 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x18) [ 1108.361370][ T5711] hfsplus: unable to parse mount options [ 1108.378751][ T5714] BPF:[1] FUNC_PROTO (anon) [ 1108.384541][ T5714] BPF:return=0 args=( [ 1108.388542][ T5714] BPF:0 (invalid-name-offset) [ 1108.393292][ T5714] BPF:, 0 [ 1108.396319][ T5714] BPF:, vararg [ 1108.399691][ T5714] BPF:) [ 1108.402497][ T5714] BPF: [ 1108.405262][ T5714] BPF:Invalid arg#1 [ 1108.409077][ T5714] BPF: [ 1108.409077][ T5714] [ 1108.428324][ T5725] BPF:[1] FUNC_PROTO (anon) [ 1108.438613][ T5725] BPF:return=0 args=( [ 1108.442674][ T5725] BPF:0 [ 1108.445527][ T5725] BPF:, vararg [ 1108.448901][ T5725] BPF:) [ 1108.451662][ T5725] BPF: [ 1108.454542][ T5725] BPF:Invalid arg#2 [ 1108.458533][ T5725] BPF: [ 1108.458533][ T5725] [ 1108.465801][ T5722] BPF:[1] FUNC_PROTO (anon) [ 1108.470418][ T5722] BPF:return=0 args=( [ 1108.475616][ T5722] BPF:0 (invalid-name-offset) [ 1108.478801][ T5726] BPF:[1] FUNC_PROTO (anon) [ 1108.480328][ T5722] BPF:, 0 [ 1108.480339][ T5722] BPF:, vararg [ 1108.480347][ T5722] BPF:) [ 1108.480356][ T5722] BPF: [ 1108.480366][ T5722] BPF:Invalid arg#1 [ 1108.480375][ T5722] BPF: [ 1108.480375][ T5722] [ 1108.507881][ T5726] BPF:return=0 args=( [ 1108.511866][ T5726] BPF:0 [ 1108.514779][ T5726] BPF:, vararg [ 1108.518147][ T5726] BPF:) [ 1108.520907][ T5726] BPF: [ 1108.523732][ T5726] BPF:Invalid arg#2 [ 1108.527571][ T5726] BPF: [ 1108.527571][ T5726] [ 1108.602548][ T8424] Bluetooth: hci0: command 0x0419 tx timeout [ 1108.626307][ T5735] device vlan1303 entered promiscuous mode 01:13:06 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x19) 01:13:06 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000140)={0x2}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0xc8e41) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r3, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00464b4, &(0x7f00000001c0)={r2}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)={0x0, @adiantum, 0x0, @desc2}) r4 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r5}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:13:06 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x6800}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:06 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4c000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1108.808779][ T5711] hfsplus: unable to parse mount options 01:13:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x24c, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1108.979484][ T5769] BPF:[1] FUNC_PROTO (anon) [ 1108.985559][ T5769] BPF:return=0 args=( [ 1108.989564][ T5769] BPF:0 (anon) [ 1108.993020][ T5769] BPF:, 2 [ 1108.996058][ T5769] BPF:) [ 1108.998845][ T5769] BPF: [ 1109.001610][ T5769] BPF:Invalid arg#1 [ 1109.005464][ T5769] BPF: [ 1109.005464][ T5769] [ 1109.081723][ T5778] BPF:[1] FUNC_PROTO (anon) [ 1109.087578][ T5778] BPF:return=0 args=( [ 1109.091576][ T5778] BPF:0 [ 1109.095824][ T5778] BPF:, vararg [ 1109.099208][ T5778] BPF:) [ 1109.102007][ T5778] BPF: [ 1109.104835][ T5778] BPF:Invalid arg#2 [ 1109.108645][ T5778] BPF: [ 1109.108645][ T5778] [ 1109.140330][ T5779] BPF:[1] FUNC_PROTO (anon) [ 1109.146110][ T5779] BPF:return=0 args=( [ 1109.150107][ T5779] BPF:0 [ 1109.154564][ T5779] BPF:, vararg [ 1109.157940][ T5779] BPF:) [ 1109.158180][ T5784] BPF:[1] FUNC_PROTO (anon) [ 1109.160698][ T5779] BPF: [ 1109.160712][ T5779] BPF:Invalid arg#2 [ 1109.160721][ T5779] BPF: [ 1109.160721][ T5779] [ 1109.179281][ T5784] BPF:return=0 args=( [ 1109.184368][ T5784] BPF:0 (invalid-name-offset) 01:13:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000), 0x20b000) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newtaction={0x14, 0x30, 0x58cbf3293c39f0e2, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x40005) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ATOMIC(r1, 0xc03864bc, &(0x7f0000000500)={0x600, 0x6, &(0x7f0000000380)=[0x1, 0x4, 0x6, 0xfffffff8, 0x3, 0x5], &(0x7f00000003c0)=[0x1, 0x3], &(0x7f0000000400)=[0x8, 0x4, 0x5f0, 0x7, 0x10000, 0x8, 0x45a], &(0x7f0000000440)=[0xff, 0x325, 0x1, 0x401], 0x0, 0x3}) fcntl$setown(r0, 0x8, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_ADDFB2(r1, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f0000000100)={{r0}, {@void, @max}}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) r4 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @empty}, &(0x7f0000000080)=0x10, 0x80000) ioctl$sock_SIOCOUTQ(r4, 0x5411, &(0x7f00000000c0)) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r3}}]}) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x801) [ 1109.189093][ T5784] BPF:, 0 [ 1109.192118][ T5784] BPF:, vararg [ 1109.196966][ T5784] BPF:) [ 1109.199781][ T5784] BPF: [ 1109.203837][ T5784] BPF:Invalid arg#1 [ 1109.207685][ T5784] BPF: [ 1109.207685][ T5784] 01:13:06 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x1a) 01:13:06 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x6c00}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:06 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000140)={0x2}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0xc8e41) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r3, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00464b4, &(0x7f00000001c0)={r2}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)={0x0, @adiantum, 0x0, @desc2}) r4 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000300)={r5}) [ 1109.342277][ T5786] BPF:[1] FUNC_PROTO (anon) [ 1109.348197][ T5786] BPF:return=0 args=( [ 1109.352221][ T5786] BPF:0 (invalid-name-offset) [ 1109.358030][ T5786] BPF:, 0 [ 1109.361067][ T5786] BPF:, vararg [ 1109.365574][ T5786] BPF:) [ 1109.368352][ T5786] BPF: [ 1109.371119][ T5786] BPF:Invalid arg#1 [ 1109.376310][ T5786] BPF: [ 1109.376310][ T5786] [ 1109.447448][ T5790] device vlan1304 entered promiscuous mode [ 1109.489089][ T5806] BPF:[1] FUNC_PROTO (anon) [ 1109.496318][ T5806] BPF:return=0 args=( [ 1109.500320][ T5806] BPF:0 (anon) [ 1109.504880][ T5806] BPF:, 2 [ 1109.507925][ T5806] BPF:) [ 1109.510693][ T5806] BPF: [ 1109.515092][ T5806] BPF:Invalid arg#1 [ 1109.518909][ T5806] BPF: [ 1109.518909][ T5806] [ 1109.538544][ T5809] BPF:[1] FUNC_PROTO (anon) [ 1109.544569][ T5809] BPF:return=0 args=( [ 1109.548565][ T5809] BPF:0 (anon) [ 1109.551944][ T5809] BPF:, 2 [ 1109.556769][ T5809] BPF:) [ 1109.559546][ T5809] BPF: [ 1109.563562][ T5809] BPF:Invalid arg#1 [ 1109.567372][ T5809] BPF: [ 1109.567372][ T5809] [ 1109.596248][ T5807] hfsplus: gid requires an argument [ 1109.601466][ T5807] hfsplus: unable to parse mount options [ 1109.619362][ T5814] BPF:[1] FUNC_PROTO (anon) [ 1109.625402][ T5814] BPF:return=0 args=( [ 1109.629394][ T5814] BPF:0 [ 1109.632242][ T5814] BPF:, vararg [ 1109.635699][ T5814] BPF:) [ 1109.638467][ T5814] BPF: [ 1109.640474][ T5820] BPF:[1] FUNC_PROTO (anon) 01:13:07 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x60000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x254, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1109.641228][ T5814] BPF:Invalid arg#2 [ 1109.641240][ T5814] BPF: [ 1109.641240][ T5814] [ 1109.658388][ T5820] BPF:return=0 args=( [ 1109.663654][ T5820] BPF:0 [ 1109.666508][ T5820] BPF:, vararg [ 1109.669877][ T5820] BPF:) [ 1109.673958][ T5820] BPF: [ 1109.676728][ T5820] BPF:Invalid arg#2 [ 1109.680529][ T5820] BPF: [ 1109.680529][ T5820] 01:13:07 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x1b) 01:13:07 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000140)={0x2}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0xc8e41) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r3, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00464b4, &(0x7f00000001c0)={r2}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)={0x0, @adiantum, 0x0, @desc2}) r4 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f00000000c0)={0x5, 0xfff, 0xd7}) 01:13:07 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x68000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:07 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x7400}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1109.779507][ T5822] hfsplus: gid requires an argument [ 1109.785108][ T5829] BPF:[1] FUNC_PROTO (anon) [ 1109.785126][ T5829] BPF:return=0 args=( [ 1109.785171][ T5829] BPF:0 (invalid-name-offset) [ 1109.785183][ T5829] BPF:, 0 [ 1109.785192][ T5829] BPF:, vararg [ 1109.785201][ T5829] BPF:) [ 1109.785210][ T5829] BPF: [ 1109.785220][ T5829] BPF:Invalid arg#1 [ 1109.785229][ T5829] BPF: [ 1109.785229][ T5829] [ 1109.819898][ T5822] hfsplus: unable to parse mount options 01:13:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r1, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) write$binfmt_elf64(r1, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x81, 0xe5, 0x55f6, 0x2, 0x0, 0x8, 0xe1, 0x40, 0x2f9, 0x7, 0x8, 0x38, 0x1, 0x1ff, 0x9, 0x1}, [{0x60000000, 0xdf0a, 0x2, 0xa63, 0xb17, 0x5, 0x400, 0x1}, {0x7, 0x8, 0x7, 0x5, 0x4, 0x1, 0x8, 0x27}], "c17d13d9579c3a4df1b5919e47c13817a00064791f5d2f375171ce368aa4c10dc4848fce5cf11574737cb8bb148d31072eee0d3102da46968fd344f504", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6ed) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r2}}]}) [ 1109.991354][ T5846] BPF:[1] FUNC_PROTO (anon) [ 1109.998309][ T5846] BPF:return=0 args=( [ 1110.001118][ T5845] BPF:[1] FUNC_PROTO (anon) [ 1110.002455][ T5846] BPF:0 [ 1110.002467][ T5846] BPF:, vararg [ 1110.002477][ T5846] BPF:) [ 1110.002486][ T5846] BPF: [ 1110.002497][ T5846] BPF:Invalid arg#2 [ 1110.002506][ T5846] BPF: [ 1110.002506][ T5846] [ 1110.031170][ T5845] BPF:return=0 args=( [ 1110.036429][ T5845] BPF:0 (anon) [ 1110.039816][ T5845] BPF:, 2 [ 1110.042914][ T5845] BPF:) [ 1110.045677][ T5845] BPF: [ 1110.048479][ T5845] BPF:Invalid arg#1 [ 1110.052356][ T5845] BPF: [ 1110.052356][ T5845] [ 1110.075008][ T5850] BPF:[1] FUNC_PROTO (anon) [ 1110.079702][ T5850] BPF:return=0 args=( [ 1110.083752][ T5860] BPF:[1] FUNC_PROTO (anon) [ 1110.083771][ T5860] BPF:return=0 args=( [ 1110.083782][ T5860] BPF:0 [ 1110.083790][ T5860] BPF:, vararg [ 1110.083798][ T5860] BPF:) [ 1110.083806][ T5860] BPF: [ 1110.083815][ T5860] BPF:Invalid arg#2 [ 1110.083824][ T5860] BPF: [ 1110.083824][ T5860] [ 1110.099400][ T5863] device vlan1305 entered promiscuous mode [ 1110.101065][ T5850] BPF:0 (anon) [ 1110.128644][ T5850] BPF:, 2 [ 1110.131676][ T5850] BPF:) [ 1110.135649][ T5850] BPF: [ 1110.138419][ T5850] BPF:Invalid arg#1 01:13:07 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x7a00}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1110.142291][ T5850] BPF: [ 1110.142291][ T5850] [ 1110.165654][ T5851] BPF:[1] FUNC_PROTO (anon) [ 1110.170308][ T5851] BPF:return=0 args=( [ 1110.175543][ T5851] BPF:0 (invalid-name-offset) [ 1110.180241][ T5851] BPF:, 0 [ 1110.184484][ T5851] BPF:, vararg [ 1110.187868][ T5851] BPF:) [ 1110.190633][ T5851] BPF: [ 1110.194066][ T5851] BPF:Invalid arg#1 [ 1110.197874][ T5851] BPF: [ 1110.197874][ T5851] 01:13:07 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000140)={0x2}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0xc8e41) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r3, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00464b4, &(0x7f00000001c0)={r2}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)={0x0, @adiantum, 0x0, @desc2}) syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) 01:13:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x260, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:07 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x6c000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1110.338845][ T5869] hfsplus: gid requires an argument [ 1110.346550][ T5869] hfsplus: unable to parse mount options [ 1110.417429][ T5875] BPF:[1] FUNC_PROTO (anon) [ 1110.422090][ T5875] BPF:return=0 args=( [ 1110.428473][ T5875] BPF:0 [ 1110.431343][ T5875] BPF:, vararg [ 1110.436433][ T5875] BPF:) [ 1110.439219][ T5875] BPF: [ 1110.441987][ T5875] BPF:Invalid arg#2 [ 1110.447035][ T5875] BPF: [ 1110.447035][ T5875] 01:13:08 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x1c) [ 1110.467638][ T5878] BPF:[1] FUNC_PROTO (anon) [ 1110.473619][ T5878] BPF:return=0 args=( [ 1110.477624][ T5878] BPF:0 [ 1110.480474][ T5878] BPF:, vararg [ 1110.485096][ T5878] BPF:) [ 1110.487873][ T5878] BPF: [ 1110.490659][ T5878] BPF:Invalid arg#2 [ 1110.495772][ T5878] BPF: [ 1110.495772][ T5878] 01:13:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in6=@private2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in=@private, 0x0, 0x32}, @in6=@local, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x50, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x20, 0x60, "bfd1a1b0"}}]}, 0x140}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r2}}]}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getnetconf={0x14, 0x52, 0x200, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x20004840) 01:13:08 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000140)={0x2}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0xc8e41) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r3, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00464b4, &(0x7f00000001c0)={r2}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)={0x0, @adiantum, 0x0, @desc2}) [ 1110.620524][ T5890] BPF:[1] FUNC_PROTO (anon) [ 1110.626357][ T5890] BPF:return=0 args=( [ 1110.630357][ T5890] BPF:0 (invalid-name-offset) [ 1110.636313][ T5890] BPF:, 0 [ 1110.639574][ T5890] BPF:, vararg [ 1110.644438][ T5890] BPF:) [ 1110.647218][ T5890] BPF: [ 1110.649983][ T5890] BPF:Invalid arg#1 [ 1110.653859][ T5890] BPF: [ 1110.653859][ T5890] 01:13:08 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0xd200}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1110.684348][ T5892] BPF:[1] FUNC_PROTO (anon) [ 1110.689018][ T5892] BPF:return=0 args=( [ 1110.694335][ T5892] BPF:0 (invalid-name-offset) [ 1110.699023][ T5892] BPF:, 0 [ 1110.702046][ T5892] BPF:, vararg [ 1110.706870][ T5892] BPF:) [ 1110.709651][ T5892] BPF: [ 1110.712462][ T5892] BPF:Invalid arg#1 [ 1110.716239][ T5896] device vlan1306 entered promiscuous mode [ 1110.716263][ T5892] BPF: [ 1110.716263][ T5892] [ 1110.760690][ T5902] BPF:[1] FUNC_PROTO (anon) [ 1110.766636][ T5902] BPF:return=0 args=( [ 1110.770667][ T5902] BPF:0 (anon) [ 1110.775429][ T5902] BPF:, 2 [ 1110.778474][ T5902] BPF:) [ 1110.781241][ T5902] BPF: [ 1110.784104][ T5902] BPF:Invalid arg#1 [ 1110.787915][ T5902] BPF: [ 1110.787915][ T5902] [ 1110.804970][ T5904] BPF:[1] FUNC_PROTO (anon) 01:13:08 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x74000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1110.809625][ T5904] BPF:return=0 args=( [ 1110.814900][ T5904] BPF:0 (anon) [ 1110.818285][ T5904] BPF:, 2 [ 1110.821307][ T5904] BPF:) [ 1110.825249][ T5904] BPF: [ 1110.828018][ T5904] BPF:Invalid arg#1 [ 1110.831822][ T5904] BPF: [ 1110.831822][ T5904] 01:13:08 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x1d) [ 1110.956477][ T5915] BPF:[1] FUNC_PROTO (anon) [ 1110.961140][ T5915] BPF:return=0 args=( [ 1110.966252][ T5915] BPF:0 [ 1110.969124][ T5915] BPF:, vararg [ 1110.973678][ T5915] BPF:) [ 1110.976453][ T5915] BPF: [ 1110.979223][ T5915] BPF:Invalid arg#2 [ 1110.984145][ T5915] BPF: [ 1110.984145][ T5915] [ 1110.999361][ T5917] BPF:[1] FUNC_PROTO (anon) 01:13:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x261, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1111.006389][ T5917] BPF:return=0 args=( [ 1111.010386][ T5917] BPF:0 [ 1111.014370][ T5917] BPF:, vararg [ 1111.017748][ T5917] BPF:) [ 1111.020512][ T5917] BPF: [ 1111.024475][ T5917] BPF:Invalid arg#2 [ 1111.028288][ T5917] BPF: [ 1111.028288][ T5917] [ 1111.039409][ T5919] hfsplus: gid requires an argument [ 1111.045661][ T5919] hfsplus: unable to parse mount options 01:13:08 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000140)={0x2}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0xc8e41) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r3, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00464b4, &(0x7f00000001c0)={r2}) [ 1111.187785][ T5930] BPF:[1] FUNC_PROTO (anon) [ 1111.193863][ T5930] BPF:return=0 args=( [ 1111.197860][ T5930] BPF:0 (invalid-name-offset) [ 1111.203837][ T5930] BPF:, 0 [ 1111.206875][ T5930] BPF:, vararg [ 1111.210246][ T5930] BPF:) [ 1111.214227][ T5930] BPF: [ 1111.217001][ T5930] BPF:Invalid arg#1 [ 1111.220811][ T5930] BPF: [ 1111.220811][ T5930] [ 1111.221454][ T5940] BPF:[1] FUNC_PROTO (anon) [ 1111.231592][ T5940] BPF:return=0 args=( 01:13:08 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0xfffff}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1111.236845][ T5940] BPF:0 (anon) [ 1111.240231][ T5940] BPF:, 2 [ 1111.244573][ T5940] BPF:) [ 1111.247342][ T5940] BPF: [ 1111.250107][ T5940] BPF:Invalid arg#1 [ 1111.255326][ T5940] BPF: [ 1111.255326][ T5940] [ 1111.286416][ T5941] BPF:[1] FUNC_PROTO (anon) [ 1111.291106][ T5941] BPF:return=0 args=( [ 1111.296487][ T5941] BPF:0 (anon) [ 1111.299870][ T5941] BPF:, 2 [ 1111.303997][ T5941] BPF:) [ 1111.306768][ T5941] BPF: [ 1111.309534][ T5941] BPF:Invalid arg#1 [ 1111.314691][ T5941] BPF: [ 1111.314691][ T5941] [ 1111.346392][ T5942] device vlan1307 entered promiscuous mode [ 1111.423870][ T5958] BPF:[1] FUNC_PROTO (anon) [ 1111.428557][ T5958] BPF:return=0 args=( [ 1111.433631][ T5958] BPF:0 [ 1111.436493][ T5958] BPF:, vararg [ 1111.439894][ T5958] BPF:) [ 1111.443765][ T5958] BPF: [ 1111.446538][ T5958] BPF:Invalid arg#2 [ 1111.450363][ T5958] BPF: [ 1111.450363][ T5958] 01:13:09 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x1e) [ 1111.471819][ T5959] BPF:[1] FUNC_PROTO (anon) [ 1111.477964][ T5959] BPF:return=0 args=( [ 1111.481957][ T5959] BPF:0 [ 1111.484872][ T5959] BPF:, vararg [ 1111.488244][ T5959] BPF:) [ 1111.491005][ T5959] BPF: [ 1111.493805][ T5959] BPF:Invalid arg#2 [ 1111.497602][ T5959] BPF: [ 1111.497602][ T5959] 01:13:09 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0xffffff}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:09 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000140)={0x2}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0xc8e41) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) 01:13:09 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x7a000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1111.581770][ T5966] BPF:[1] FUNC_PROTO (anon) [ 1111.587905][ T5966] BPF:return=0 args=( [ 1111.591900][ T5966] BPF:0 (anon) [ 1111.596521][ T5966] BPF:, 2 [ 1111.599556][ T5966] BPF:) [ 1111.603413][ T5966] BPF: [ 1111.606182][ T5966] BPF:Invalid arg#1 [ 1111.609992][ T5966] BPF: [ 1111.609992][ T5966] [ 1111.644752][ T5967] BPF:[1] FUNC_PROTO (anon) [ 1111.649448][ T5967] BPF:return=0 args=( [ 1111.654731][ T5967] BPF:0 (anon) [ 1111.658124][ T5967] BPF:, 2 [ 1111.661336][ T5967] BPF:) [ 1111.665337][ T5967] BPF: [ 1111.668117][ T5967] BPF:Invalid arg#1 [ 1111.671923][ T5967] BPF: [ 1111.671923][ T5967] [ 1111.773035][ T5919] hfsplus: gid requires an argument [ 1111.778268][ T5919] hfsplus: unable to parse mount options [ 1111.796067][ T5980] BPF:[1] FUNC_PROTO (anon) [ 1111.800687][ T5980] BPF:return=0 args=( [ 1111.807028][ T5980] BPF:0 [ 1111.809894][ T5980] BPF:, vararg [ 1111.814437][ T5980] BPF:) [ 1111.817217][ T5980] BPF: [ 1111.819985][ T5980] BPF:Invalid arg#2 [ 1111.825116][ T5980] BPF: [ 1111.825116][ T5980] [ 1111.836540][ T5983] BPF:[1] FUNC_PROTO (anon) [ 1111.841182][ T5983] BPF:return=0 args=( [ 1111.846597][ T5983] BPF:0 [ 1111.849458][ T5983] BPF:, vararg [ 1111.854150][ T5983] BPF:) [ 1111.856918][ T5983] BPF: [ 1111.859681][ T5983] BPF:Invalid arg#2 [ 1111.864844][ T5983] BPF: [ 1111.864844][ T5983] [ 1111.937121][ T5990] BPF:[1] FUNC_PROTO (anon) [ 1111.941779][ T5990] BPF:return=0 args=( [ 1111.948295][ T5990] BPF:0 (invalid-name-offset) [ 1111.949100][ T5992] BPF:[1] FUNC_PROTO (anon) [ 1111.953035][ T5990] BPF:, 0 [ 1111.953046][ T5990] BPF:, vararg [ 1111.953055][ T5990] BPF:) [ 1111.953064][ T5990] BPF: [ 1111.953074][ T5990] BPF:Invalid arg#1 [ 1111.953083][ T5990] BPF: [ 1111.953083][ T5990] [ 1111.981952][ T5992] BPF:return=0 args=( 01:13:09 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x4c100, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000240)={0x100, 0x1, 0x1, 'queue0\x00', 0xf9f2}) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x1000, 0x5, 0x8000}, &(0x7f0000000300)=0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="000003000b0000", @ANYRES16=r2, @ANYBLOB="00082bbd7000fbdbdf250600000008000600", @ANYBLOB="ef602b797f8c083e432c4189c6558aefa3cf47e4d1a8ae9ca720754f2781dbf2dbc5609d7d021d23cddd2dbbc7781775f3cd19b7dd0054943ea9d628c67717c99f0595d762e84390671276c8c54e7bdc594329e17ad7c298d4eb060d3149a3e156727cbb091bf984989132a252ec607c222fc17faecced31c484b1768ea25388c621efa8ee5b32fe752d2c48474a6afb4c08591c55287d4f5df34ec65c2861", @ANYBLOB="0500330001000000080039000000000008002c003e00000008003100e90c00000a0009000000000000000000050033000200000008003c000800000005002a00010000000500330002000000"], 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x88094) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)=ANY=[@ANYBLOB='gid=', @ANYRESHEX, @ANYBLOB="0004"]) 01:13:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x271, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:09 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000140)={0x2}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0xc8e41) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:13:09 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x24) 01:13:09 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x1000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1111.986001][ T5992] BPF:0 (invalid-name-offset) [ 1111.990674][ T5992] BPF:, 0 [ 1111.993742][ T5992] BPF:, vararg [ 1111.997111][ T5992] BPF:) [ 1111.999870][ T5992] BPF: [ 1112.002684][ T5992] BPF:Invalid arg#1 [ 1112.006486][ T5992] BPF: [ 1112.006486][ T5992] 01:13:09 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xd2000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1112.085695][ T5999] BPF:[1] FUNC_PROTO (anon) [ 1112.090360][ T5999] BPF:return=0 args=( [ 1112.095652][ T5999] BPF:0 (anon) [ 1112.099045][ T5999] BPF:, 2 [ 1112.103263][ T5999] BPF:) [ 1112.106034][ T5999] BPF: [ 1112.108801][ T5999] BPF:Invalid arg#1 [ 1112.112676][ T5999] BPF: [ 1112.112676][ T5999] 01:13:09 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000140)={0x2}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0xc8e41) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) 01:13:09 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x25) [ 1112.131709][ T6001] BPF:[1] FUNC_PROTO (anon) [ 1112.137327][ T6001] BPF:return=0 args=( [ 1112.141320][ T6001] BPF:0 (anon) [ 1112.145919][ T6001] BPF:, 2 [ 1112.148948][ T6001] BPF:) [ 1112.151710][ T6001] BPF: [ 1112.155565][ T6001] BPF:Invalid arg#1 [ 1112.159377][ T6001] BPF: [ 1112.159377][ T6001] [ 1112.230441][ T6003] device vlan1308 entered promiscuous mode [ 1112.258193][ T6017] BPF:[1] FUNC_PROTO (anon) [ 1112.265496][ T6017] BPF:return=0 args=( [ 1112.269496][ T6017] BPF:0 [ 1112.273587][ T6017] BPF:, vararg [ 1112.277267][ T6017] BPF:) [ 1112.280037][ T6017] BPF: [ 1112.284187][ T6017] BPF:Invalid arg#2 [ 1112.288006][ T6017] BPF: [ 1112.288006][ T6017] [ 1112.299889][ T6026] BPF:[1] FUNC_PROTO (anon) [ 1112.305774][ T6026] BPF:return=0 args=( [ 1112.309774][ T6026] BPF:0 (invalid-name-offset) [ 1112.315689][ T6026] BPF:, 0 [ 1112.318725][ T6026] BPF:, vararg [ 1112.323236][ T6026] BPF:) [ 1112.326006][ T6026] BPF: [ 1112.328777][ T6026] BPF:Invalid arg#1 [ 1112.334047][ T6026] BPF: [ 1112.334047][ T6026] [ 1112.351580][ T6027] BPF:[1] FUNC_PROTO (anon) [ 1112.358099][ T6027] BPF:return=0 args=( [ 1112.362180][ T6027] BPF:0 (invalid-name-offset) [ 1112.366962][ T6027] BPF:, 0 [ 1112.369991][ T6027] BPF:, vararg [ 1112.373444][ T6027] BPF:) [ 1112.376208][ T6027] BPF: [ 1112.378992][ T6027] BPF:Invalid arg#1 [ 1112.382880][ T6027] BPF: [ 1112.382880][ T6027] 01:13:09 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000140)={0x2}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) syz_open_dev$dri(&(0x7f0000000100), 0x1, 0xc8e41) 01:13:10 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xffff0f00}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:10 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x2000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1112.428458][ T6036] BPF:[1] FUNC_PROTO (anon) [ 1112.429674][ T6035] hfsplus: invalid gid specified [ 1112.434658][ T6036] BPF:return=0 args=( [ 1112.439429][ T6035] hfsplus: unable to parse mount options [ 1112.450071][ T6036] BPF:0 (anon) [ 1112.454520][ T6036] BPF:, 2 [ 1112.457555][ T6036] BPF:) [ 1112.460324][ T6036] BPF: [ 1112.464531][ T6036] BPF:Invalid arg#1 [ 1112.468352][ T6036] BPF: [ 1112.468352][ T6036] [ 1112.503784][ T6040] BPF:[1] FUNC_PROTO (anon) [ 1112.508416][ T6040] BPF:return=0 args=( [ 1112.513521][ T6040] BPF:0 (anon) [ 1112.516919][ T6040] BPF:, 2 [ 1112.519945][ T6040] BPF:) [ 1112.525659][ T6040] BPF: [ 1112.528458][ T6040] BPF:Invalid arg#1 [ 1112.532336][ T6040] BPF: [ 1112.532336][ T6040] 01:13:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x27c, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1112.555057][ T6047] hfsplus: invalid gid specified [ 1112.560027][ T6047] hfsplus: unable to parse mount options [ 1112.657938][ T6055] BPF:[1] FUNC_PROTO (anon) [ 1112.663863][ T6055] BPF:return=0 args=( [ 1112.667867][ T6055] BPF:0 (invalid-name-offset) [ 1112.673721][ T6055] BPF:, 0 [ 1112.676755][ T6055] BPF:, vararg [ 1112.680126][ T6055] BPF:) [ 1112.684073][ T6055] BPF: [ 1112.686686][ T6059] BPF:[1] FUNC_PROTO (anon) [ 1112.687025][ T6055] BPF:Invalid arg#1 [ 1112.691476][ T6059] BPF:return=0 args=( [ 1112.696401][ T6055] BPF: [ 1112.696401][ T6055] [ 1112.707181][ T6059] BPF:0 [ 1112.710039][ T6059] BPF:, vararg [ 1112.714728][ T6059] BPF:) [ 1112.717498][ T6059] BPF: [ 1112.720276][ T6059] BPF:Invalid arg#2 [ 1112.725500][ T6059] BPF: [ 1112.725500][ T6059] [ 1112.750379][ T6058] BPF:[1] FUNC_PROTO (anon) [ 1112.750868][ T6062] BPF:[1] FUNC_PROTO (anon) [ 1112.759884][ T6058] BPF:return=0 args=( [ 1112.761835][ T6062] BPF:return=0 args=( [ 1112.765856][ T6058] BPF:0 (invalid-name-offset) [ 1112.769850][ T6062] BPF:0 [ 1112.774504][ T6058] BPF:, 0 [ 1112.774514][ T6058] BPF:, vararg [ 1112.774524][ T6058] BPF:) [ 1112.774532][ T6058] BPF: [ 1112.774542][ T6058] BPF:Invalid arg#1 [ 1112.774551][ T6058] BPF: [ 1112.774551][ T6058] [ 1112.802895][ T6062] BPF:, vararg [ 1112.806272][ T6062] BPF:) [ 1112.809038][ T6062] BPF: [ 1112.811803][ T6062] BPF:Invalid arg#2 [ 1112.815668][ T6062] BPF: [ 1112.815668][ T6062] 01:13:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) 01:13:10 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000140)={0x2}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) 01:13:10 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x29) [ 1112.894724][ T6066] device vlan1309 entered promiscuous mode 01:13:10 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xffffff00}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:10 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x3000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x289, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:10 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000140)={0x2}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) [ 1113.101412][ T6084] BPF:[1] FUNC_PROTO (anon) [ 1113.108504][ T6084] BPF:return=0 args=( [ 1113.113900][ T6084] BPF:0 (anon) [ 1113.117297][ T6084] BPF:, 2 [ 1113.120329][ T6084] BPF:) [ 1113.124496][ T6084] BPF: [ 1113.127272][ T6084] BPF:Invalid arg#1 [ 1113.131082][ T6084] BPF: [ 1113.131082][ T6084] [ 1113.168844][ T6087] BPF:[1] FUNC_PROTO (anon) [ 1113.174733][ T6087] BPF:return=0 args=( [ 1113.179076][ T6087] BPF:0 (anon) [ 1113.183717][ T6087] BPF:, 2 [ 1113.186744][ T6087] BPF:) [ 1113.189504][ T6087] BPF: [ 1113.193645][ T6087] BPF:Invalid arg#1 [ 1113.197789][ T6087] BPF: [ 1113.197789][ T6087] [ 1113.215494][ T6088] hfsplus: unable to find HFS+ superblock [ 1113.235310][ T6099] BPF:[1] FUNC_PROTO (anon) [ 1113.240042][ T6099] BPF:return=0 args=( [ 1113.245294][ T6099] BPF:0 (invalid-name-offset) [ 1113.249983][ T6099] BPF:, 0 [ 1113.253053][ T6099] BPF:, vararg [ 1113.256427][ T6099] BPF:) [ 1113.259195][ T6099] BPF: [ 1113.262020][ T6099] BPF:Invalid arg#1 [ 1113.265828][ T6099] BPF: [ 1113.265828][ T6099] [ 1113.293248][ T6101] BPF:[1] FUNC_PROTO (anon) [ 1113.297908][ T6101] BPF:return=0 args=( [ 1113.302163][ T6101] BPF:0 (invalid-name-offset) [ 1113.306848][ T6101] BPF:, 0 [ 1113.309871][ T6101] BPF:, vararg [ 1113.315576][ T6101] BPF:) [ 1113.318357][ T6101] BPF: [ 1113.319089][ T6100] device vlan1310 entered promiscuous mode [ 1113.321114][ T6101] BPF:Invalid arg#1 [ 1113.330781][ T6101] BPF: [ 1113.330781][ T6101] 01:13:10 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x2b) [ 1113.339844][ T6106] BPF:[1] FUNC_PROTO (anon) [ 1113.345645][ T6106] BPF:return=0 args=( [ 1113.349641][ T6106] BPF:0 [ 1113.354049][ T6106] BPF:, vararg [ 1113.357427][ T6106] BPF:) [ 1113.360205][ T6106] BPF: [ 1113.364342][ T6106] BPF:Invalid arg#2 [ 1113.368162][ T6106] BPF: [ 1113.368162][ T6106] 01:13:10 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000140)={0x2}) [ 1113.444278][ T6116] hfsplus: unable to find HFS+ superblock 01:13:11 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x4000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:11 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000140)={0x2}) [ 1113.568852][ T6123] BPF:[1] FUNC_PROTO (anon) [ 1113.575938][ T6123] BPF:return=0 args=( [ 1113.579943][ T6123] BPF:0 (anon) [ 1113.584419][ T6123] BPF:, 2 [ 1113.587457][ T6123] BPF:) [ 1113.590224][ T6123] BPF: [ 1113.593951][ T6123] BPF:Invalid arg#1 [ 1113.594650][ T6129] BPF:[1] FUNC_PROTO (anon) [ 1113.597762][ T6123] BPF: [ 1113.597762][ T6123] [ 1113.608635][ T6129] BPF:return=0 args=( [ 1113.612705][ T6129] BPF:0 (anon) [ 1113.616080][ T6129] BPF:, 2 01:13:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x2f2, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1113.619096][ T6129] BPF:) [ 1113.621857][ T6129] BPF: [ 1113.624695][ T6129] BPF:Invalid arg#1 [ 1113.628503][ T6129] BPF: [ 1113.628503][ T6129] 01:13:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xa4, 0x1, 0x3, 0x0, 0x0, 0x0, {0xc, 0x0, 0x7}, [@NFQA_VLAN={0xc, 0x13, 0x0, 0x1, [@NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x401}]}, @NFQA_VLAN={0x2c, 0x13, 0x0, 0x1, [@NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x7}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x422}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x7fff}]}, @NFQA_PAYLOAD={0x8, 0xa, "c6517086"}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x7}, @NFQA_EXP={0x4}, @NFQA_VLAN={0x44, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x9}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x6}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x4}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}]}]}, 0xa4}}, 0x40041) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:13:11 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:11 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x2f) 01:13:11 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000140)={0x2}) [ 1113.814486][ T6142] BPF:[1] FUNC_PROTO (anon) [ 1113.815472][ T6139] BPF:[1] FUNC_PROTO (anon) [ 1113.819109][ T6142] BPF:return=0 args=( [ 1113.819125][ T6142] BPF:0 (anon) [ 1113.819137][ T6142] BPF:, 0 [ 1113.819146][ T6142] BPF:, vararg [ 1113.823760][ T6139] BPF:return=0 args=( [ 1113.823774][ T6139] BPF:0 [ 1113.823783][ T6139] BPF:, vararg [ 1113.823792][ T6139] BPF:) [ 1113.823801][ T6139] BPF: [ 1113.823810][ T6139] BPF:Invalid arg#2 [ 1113.823820][ T6139] BPF: [ 1113.823820][ T6139] [ 1113.839649][ T6143] BPF:[1] FUNC_PROTO (anon) [ 1113.840172][ T6142] BPF:) [ 1113.845450][ T6143] BPF:return=0 args=( [ 1113.845465][ T6143] BPF:0 [ 1113.845474][ T6143] BPF:, vararg [ 1113.845483][ T6143] BPF:) [ 1113.845492][ T6143] BPF: [ 1113.845501][ T6143] BPF:Invalid arg#2 [ 1113.845510][ T6143] BPF: [ 1113.845510][ T6143] [ 1113.904720][ T6142] BPF: [ 1113.907502][ T6142] BPF:Invalid arg#1 [ 1113.911315][ T6142] BPF: 01:13:11 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x5000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1113.911315][ T6142] [ 1113.940592][ T6151] device vlan1311 entered promiscuous mode [ 1113.950151][ T6144] BPF:[1] FUNC_PROTO (anon) [ 1113.956058][ T6144] BPF:return=0 args=( [ 1113.960047][ T6144] BPF:0 (anon) [ 1113.964534][ T6144] BPF:, 0 [ 1113.967652][ T6144] BPF:, vararg [ 1113.971024][ T6144] BPF:) [ 1113.975196][ T6144] BPF: [ 1113.976663][ T6148] hfsplus: gid requires an argument [ 1113.977962][ T6144] BPF:Invalid arg#1 [ 1113.985639][ T6148] hfsplus: unable to parse mount options [ 1113.988206][ T6144] BPF: [ 1113.988206][ T6144] [ 1114.077904][ T6162] BPF:[1] FUNC_PROTO (anon) [ 1114.083783][ T6162] BPF:return=0 args=( [ 1114.087782][ T6162] BPF:0 (anon) [ 1114.091157][ T6162] BPF:, 2 [ 1114.095513][ T6162] BPF:) [ 1114.098292][ T6162] BPF: [ 1114.101054][ T6162] BPF:Invalid arg#1 [ 1114.106268][ T6162] BPF: [ 1114.106268][ T6162] [ 1114.155040][ T6163] BPF:[1] FUNC_PROTO (anon) [ 1114.159661][ T6163] BPF:return=0 args=( [ 1114.164756][ T6163] BPF:0 (anon) [ 1114.168146][ T6163] BPF:, 2 [ 1114.171166][ T6163] BPF:) [ 1114.175126][ T6163] BPF: [ 1114.177901][ T6163] BPF:Invalid arg#1 [ 1114.181706][ T6163] BPF: [ 1114.181706][ T6163] 01:13:11 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000140)={0x2}) 01:13:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x300, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1114.239769][ T6169] BPF:[1] FUNC_PROTO (anon) [ 1114.245902][ T6169] BPF:return=0 args=( [ 1114.249894][ T6169] BPF:0 [ 1114.253932][ T6169] BPF:, vararg [ 1114.257400][ T6169] BPF:) [ 1114.260166][ T6169] BPF: [ 1114.264222][ T6169] BPF:Invalid arg#2 [ 1114.268033][ T6169] BPF: [ 1114.268033][ T6169] 01:13:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000140)=0x9, 0x4) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@mpls_getnetconf={0x1c, 0x52, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@NETCONFA_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x800) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:13:11 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x32) [ 1114.318704][ T6174] BPF:[1] FUNC_PROTO (anon) [ 1114.325406][ T6174] BPF:return=0 args=( [ 1114.329401][ T6174] BPF:0 [ 1114.333767][ T6174] BPF:, vararg [ 1114.337149][ T6174] BPF:) [ 1114.339905][ T6174] BPF: [ 1114.342718][ T6174] BPF:Invalid arg#2 [ 1114.346522][ T6174] BPF: [ 1114.346522][ T6174] 01:13:11 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x6000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:11 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:11 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000140)={0x2}) [ 1114.559946][ T6192] BPF:[1] FUNC_PROTO (anon) [ 1114.563503][ T6194] device vlan1312 entered promiscuous mode [ 1114.565752][ T6192] BPF:return=0 args=( [ 1114.575629][ T6192] BPF:0 (anon) [ 1114.579011][ T6192] BPF:, 2 [ 1114.583253][ T6192] BPF:) [ 1114.586025][ T6192] BPF: [ 1114.588788][ T6192] BPF:Invalid arg#1 [ 1114.593760][ T6192] BPF: [ 1114.593760][ T6192] [ 1114.609202][ T6190] hfsplus: gid requires an argument [ 1114.615690][ T6190] hfsplus: unable to parse mount options [ 1114.636584][ T6196] BPF:[1] FUNC_PROTO (anon) [ 1114.641239][ T6196] BPF:return=0 args=( [ 1114.647613][ T6196] BPF:0 (anon) [ 1114.650992][ T6196] BPF:, 2 [ 1114.655235][ T6196] BPF:) [ 1114.658003][ T6196] BPF: [ 1114.660766][ T6196] BPF:Invalid arg#1 [ 1114.665834][ T6196] BPF: [ 1114.665834][ T6196] 01:13:12 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000140)={0x2}) [ 1114.702523][ T6203] BPF:[1] FUNC_PROTO (anon) [ 1114.707174][ T6203] BPF:return=0 args=( [ 1114.711165][ T6203] BPF:0 [ 1114.716504][ T6203] BPF:, vararg [ 1114.719892][ T6203] BPF:) [ 1114.720318][ T6210] BPF:[1] FUNC_PROTO (anon) [ 1114.722686][ T6203] BPF: [ 1114.722699][ T6203] BPF:Invalid arg#2 [ 1114.722709][ T6203] BPF: [ 1114.722709][ T6203] [ 1114.731033][ T6206] BPF:[1] FUNC_PROTO (anon) [ 1114.731065][ T6210] BPF:return=0 args=( [ 1114.737498][ T6206] BPF:return=0 args=( [ 1114.739758][ T6210] BPF:2 (anon) [ 1114.744613][ T6206] BPF:0 [ 1114.748418][ T6210] BPF:, 0 [ 1114.752401][ T6206] BPF:, vararg [ 1114.752412][ T6206] BPF:) [ 1114.755761][ T6210] BPF:, vararg [ 1114.758588][ T6206] BPF: [ 1114.758600][ T6206] BPF:Invalid arg#2 [ 1114.761592][ T6210] BPF:) [ 1114.761602][ T6210] BPF: [ 1114.764971][ T6206] BPF: [ 1114.764971][ T6206] [ 1114.788090][ T6210] BPF:Invalid arg#1 [ 1114.791976][ T6210] BPF: [ 1114.791976][ T6210] 01:13:12 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x7000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:12 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000140)={0x2}) [ 1114.846557][ T6212] BPF:[1] FUNC_PROTO (anon) [ 1114.851250][ T6212] BPF:return=0 args=( [ 1114.855319][ T6212] BPF:2 (anon) [ 1114.858694][ T6212] BPF:, 0 [ 1114.861713][ T6212] BPF:, vararg [ 1114.865171][ T6212] BPF:) [ 1114.867933][ T6212] BPF: [ 1114.870696][ T6212] BPF:Invalid arg#1 [ 1114.874579][ T6212] BPF: [ 1114.874579][ T6212] 01:13:12 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x34) 01:13:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x304, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1114.908529][ T6222] hfsplus: gid requires an argument [ 1114.913819][ T6222] hfsplus: unable to parse mount options 01:13:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)=ANY=[@ANYBLOB="8369643d", @ANYRESHEX=r1, @ANYBLOB=',\x00']) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0x80000001}, &(0x7f0000000080)=0x8) [ 1115.116889][ T6252] BPF:[1] FUNC_PROTO (anon) [ 1115.121589][ T6252] BPF:return=0 args=( [ 1115.126881][ T6252] BPF:0 [ 1115.129750][ T6252] BPF:, vararg [ 1115.134256][ T6252] BPF:) [ 1115.137031][ T6252] BPF: [ 1115.139792][ T6252] BPF:Invalid arg#2 [ 1115.145439][ T6252] BPF: [ 1115.145439][ T6252] [ 1115.159062][ T6248] device vlan1313 entered promiscuous mode [ 1115.175064][ T6254] BPF:[1] FUNC_PROTO (anon) [ 1115.179733][ T6254] BPF:return=0 args=( [ 1115.184880][ T6254] BPF:0 (anon) [ 1115.188264][ T6254] BPF:, 2 [ 1115.191287][ T6254] BPF:) [ 1115.195655][ T6254] BPF: [ 1115.198428][ T6254] BPF:Invalid arg#1 [ 1115.203591][ T6254] BPF: [ 1115.203591][ T6254] [ 1115.214104][ T6259] BPF:[1] FUNC_PROTO (anon) [ 1115.218759][ T6259] BPF:return=0 args=( [ 1115.224373][ T6259] BPF:0 (anon) [ 1115.227751][ T6259] BPF:, 2 [ 1115.230776][ T6259] BPF:) [ 1115.233582][ T6259] BPF: [ 1115.236348][ T6259] BPF:Invalid arg#1 [ 1115.240154][ T6259] BPF: [ 1115.240154][ T6259] 01:13:12 executing program 0: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000140)={0x2}) 01:13:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x332, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:12 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x60) [ 1115.354608][ T6264] hfsplus: unable to parse mount options 01:13:12 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x3}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:12 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x8000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1115.458317][ T6273] hfsplus: unable to parse mount options [ 1115.476611][ T1228] ieee802154 phy0 wpan0: encryption failed: -22 [ 1115.482994][ T1228] ieee802154 phy1 wpan1: encryption failed: -22 01:13:13 executing program 0: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000140)={0x2}) [ 1115.603259][ T6281] BPF:[1] FUNC_PROTO (anon) [ 1115.607917][ T6281] BPF:return=0 args=( [ 1115.614297][ T6281] BPF:0 (anon) [ 1115.617692][ T6281] BPF:, 2 [ 1115.620717][ T6281] BPF:) [ 1115.625254][ T6281] BPF: [ 1115.628032][ T6281] BPF:Invalid arg#1 [ 1115.633035][ T6281] BPF: [ 1115.633035][ T6281] [ 1115.654797][ T6283] BPF:[1] FUNC_PROTO (anon) [ 1115.659419][ T6283] BPF:return=0 args=( [ 1115.664811][ T6283] BPF:0 (anon) [ 1115.668197][ T6283] BPF:, 2 [ 1115.671221][ T6283] BPF:) [ 1115.675463][ T6283] BPF: [ 1115.678234][ T6283] BPF:Invalid arg#1 [ 1115.683465][ T6283] BPF: [ 1115.683465][ T6283] 01:13:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(0xffffffffffffffff, 0x114, 0xa, &(0x7f0000000100)=ANY=[@ANYBLOB="035947d083b18d532fd8161ab1413d1ec6dc9bbba5a2a4b5d0cdd571d16628d83fa0d0d13cde33ab210b79fbecf67a3d2952591ba82a8c35e3345a179f01aeec7ef68dd9dc05d09613112afea3ac0711dd77ec729aec04924d22ae8163186c13c4b3f91e418a74dc8d07104e80f6c72f341a0800000070d7130d2704bc0a1897f6c44a72c05ad752dc8de93a3cb91b336271d40fa53e9cb813054a6308733daf50d8c6faf6ef252395b0164671fb8ba8"], 0x4) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e24, @loopback}, 0x10) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) 01:13:13 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x3fff8) [ 1115.766089][ T6290] device vlan1314 entered promiscuous mode [ 1115.773746][ T6292] BPF:[1] FUNC_PROTO (anon) [ 1115.778422][ T6292] BPF:return=0 args=( [ 1115.783829][ T6292] BPF:3 (anon) [ 1115.787219][ T6292] BPF:, 0 [ 1115.790238][ T6292] BPF:, vararg [ 1115.794644][ T6292] BPF:) [ 1115.797417][ T6292] BPF: [ 1115.800178][ T6292] BPF:Invalid arg#1 [ 1115.805329][ T6292] BPF: [ 1115.805329][ T6292] [ 1115.835763][ T6296] BPF:[1] FUNC_PROTO (anon) [ 1115.840378][ T6296] BPF:return=0 args=( [ 1115.845545][ T6296] BPF:0 [ 1115.848415][ T6296] BPF:, vararg [ 1115.853192][ T6296] BPF:) [ 1115.855964][ T6296] BPF: [ 1115.858727][ T6296] BPF:Invalid arg#2 [ 1115.864217][ T6296] BPF: [ 1115.864217][ T6296] 01:13:13 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20000160) 01:13:13 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x4}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:13 executing program 0: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000140)={0x2}) 01:13:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x359, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1116.059089][ T6320] hfsplus: gid requires an argument [ 1116.066088][ T6320] hfsplus: unable to parse mount options [ 1116.120360][ T6326] BPF:[1] FUNC_PROTO (anon) [ 1116.127724][ T6326] BPF:return=0 args=( [ 1116.132965][ T6326] BPF:4 (anon) [ 1116.136374][ T6326] BPF:, 0 [ 1116.139401][ T6326] BPF:, vararg [ 1116.144202][ T6326] BPF:) [ 1116.146983][ T6326] BPF: [ 1116.149752][ T6326] BPF:Invalid arg#1 [ 1116.154744][ T6326] BPF: [ 1116.154744][ T6326] [ 1116.165055][ T6330] BPF:[1] FUNC_PROTO (anon) 01:13:13 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0xa000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1116.169875][ T6330] BPF:return=0 args=( [ 1116.175396][ T6330] BPF:4 (anon) [ 1116.178786][ T6330] BPF:, 0 [ 1116.181862][ T6330] BPF:, vararg [ 1116.185238][ T6330] BPF:) [ 1116.188000][ T6330] BPF: [ 1116.190759][ T6330] BPF:Invalid arg#1 [ 1116.194633][ T6330] BPF: [ 1116.194633][ T6330] 01:13:13 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000002000000000000000200000d00000000000001000000000001000000020000000000"], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1116.297794][ T6339] hfsplus: gid requires an argument [ 1116.304303][ T6339] hfsplus: unable to parse mount options 01:13:13 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x5}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1116.386392][ T6347] device vlan1315 entered promiscuous mode 01:13:13 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000140)={0x2}) 01:13:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000480)=0xc) [ 1116.488144][ T6360] BPF:[1] FUNC_PROTO (anon) [ 1116.494223][ T6360] BPF:return=0 args=( [ 1116.498256][ T6360] BPF:0 [ 1116.501118][ T6360] BPF:, vararg [ 1116.505816][ T6360] BPF:) [ 1116.508594][ T6360] BPF: [ 1116.511368][ T6360] BPF:Invalid arg#2 [ 1116.516381][ T6360] BPF: [ 1116.516381][ T6360] [ 1116.544979][ T6365] BPF:[1] FUNC_PROTO (anon) [ 1116.549662][ T6365] BPF:return=0 args=( [ 1116.554812][ T6365] BPF:0 (invalid-name-offset) [ 1116.559501][ T6365] BPF:, 2 [ 1116.563692][ T6365] BPF:) [ 1116.566462][ T6365] BPF: [ 1116.569228][ T6365] BPF:Invalid arg#1 [ 1116.574130][ T6365] BPF: [ 1116.574130][ T6365] 01:13:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x35a, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1116.646565][ T6370] BPF:[1] FUNC_PROTO (anon) [ 1116.651238][ T6370] BPF:return=0 args=( [ 1116.656444][ T6370] BPF:5 (anon) [ 1116.659839][ T6370] BPF:, 0 [ 1116.664206][ T6370] BPF:, vararg [ 1116.667595][ T6370] BPF:) [ 1116.670370][ T6370] BPF: [ 1116.674688][ T6370] BPF:Invalid arg#1 [ 1116.678835][ T6370] BPF: [ 1116.678835][ T6370] [ 1116.699170][ T6374] BPF:[1] FUNC_PROTO (anon) [ 1116.705220][ T6374] BPF:return=0 args=( [ 1116.709223][ T6374] BPF:5 (anon) [ 1116.713886][ T6374] BPF:, 0 [ 1116.716922][ T6374] BPF:, vararg [ 1116.720297][ T6374] BPF:) [ 1116.724237][ T6374] BPF: [ 1116.727021][ T6374] BPF:Invalid arg#1 [ 1116.730817][ T6374] BPF: [ 1116.730817][ T6374] 01:13:14 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x1c000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:14 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000140)={0x2}) 01:13:14 executing program 3: socket$unix(0x1, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010007000000000000001c0000001c008f218f507effefd5c90fd595cb000002000000100000000200000d0000000000000000000000000100000002000000000062f90fd64d08a7c7889a139af326b1eb37aaeb52a7cef805bf0db1de7415e6067bc9071f4c45ef612f"], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1116.895337][ T6388] device vlan1316 entered promiscuous mode 01:13:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file1\x00', 0xf0, 0xaaaaaaaaaaaab15, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@force}]}) [ 1116.952448][ T6393] BPF:[1] FUNC_PROTO (anon) [ 1116.957144][ T6393] BPF:return=0 args=( [ 1116.961133][ T6393] BPF:0 [ 1116.966489][ T6393] BPF:, vararg [ 1116.969880][ T6393] BPF:) [ 1116.973848][ T6393] BPF: [ 1116.976624][ T6393] BPF:Invalid arg#2 [ 1116.980442][ T6393] BPF: [ 1116.980442][ T6393] [ 1116.991628][ T6395] BPF:[1] FUNC_PROTO (anon) [ 1116.997677][ T6395] BPF:return=0 args=( 01:13:14 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x6}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1117.003008][ T6395] BPF:0 [ 1117.005964][ T6395] BPF:, vararg [ 1117.009343][ T6395] BPF:) [ 1117.013477][ T6395] BPF: [ 1117.016251][ T6395] BPF:Invalid arg#2 [ 1117.020052][ T6395] BPF: [ 1117.020052][ T6395] [ 1117.088805][ T6399] BPF:Unsupported section found 01:13:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x36a, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000100)) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180)={r0}, 0x8) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='memory.events\x00') perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0xfd, 0x1, 0x0, 0xbc, 0x0, 0x0, 0x8, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000000), 0x3}, 0x8882, 0x4, 0x3, 0x5, 0x80, 0x0, 0xa8, 0x0, 0x9, 0x0, 0x1ff}, 0xffffffffffffffff, 0x1, r1, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000081c0000001c00000002000000000000000200000d0000000000000000000000000100000002000000b24a1c000058e9da89411def63b827d484917f184b50b70ebcceeebc6c5a9a9b2e876867fc0bc8ba"], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1117.136501][ T6403] BPF:Unsupported section found 01:13:14 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000140)={0x2}) 01:13:14 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x1e000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1117.231496][ T6409] BPF:[1] FUNC_PROTO (anon) [ 1117.237607][ T6409] BPF:return=0 args=( [ 1117.241606][ T6409] BPF:6 (anon) [ 1117.246286][ T6409] BPF:, 0 [ 1117.249315][ T6409] BPF:, vararg [ 1117.253948][ T6409] BPF:) [ 1117.256722][ T6409] BPF: [ 1117.259483][ T6409] BPF:Invalid arg#1 [ 1117.264572][ T6409] BPF: [ 1117.264572][ T6409] [ 1117.303807][ T6410] BPF:[1] FUNC_PROTO (anon) [ 1117.308427][ T6410] BPF:return=0 args=( [ 1117.313715][ T6410] BPF:6 (anon) [ 1117.317099][ T6410] BPF:, 0 [ 1117.320123][ T6410] BPF:, vararg [ 1117.324678][ T6410] BPF:) [ 1117.327451][ T6410] BPF: [ 1117.330220][ T6410] BPF:Invalid arg#1 [ 1117.335163][ T6410] BPF: [ 1117.335163][ T6410] [ 1117.351383][ T6420] BPF:Unsupported section found [ 1117.375042][ T6423] BPF:Unsupported section found 01:13:14 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000180), 0x2a101, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0xf501, 0x0) 01:13:14 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x7}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1117.428552][ T6416] device vlan1317 entered promiscuous mode [ 1117.498514][ T6433] BPF:[1] FUNC_PROTO (anon) [ 1117.504484][ T6433] BPF:return=0 args=( [ 1117.508481][ T6433] BPF:0 [ 1117.511336][ T6433] BPF:, vararg [ 1117.515900][ T6433] BPF:) [ 1117.516993][ T6435] BPF:[1] FUNC_PROTO (anon) [ 1117.518674][ T6433] BPF: [ 1117.518686][ T6433] BPF:Invalid arg#2 [ 1117.518696][ T6433] BPF: [ 1117.518696][ T6433] [ 1117.538604][ T6435] BPF:return=0 args=( [ 1117.543751][ T6435] BPF:0 [ 1117.546611][ T6435] BPF:, vararg [ 1117.550003][ T6435] BPF:) [ 1117.553971][ T6435] BPF: [ 1117.556744][ T6435] BPF:Invalid arg#2 [ 1117.560549][ T6435] BPF: [ 1117.560549][ T6435] 01:13:15 executing program 0: syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000140)={0x2}) 01:13:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x7f, 0xf2cd, 0x7ff, 0xffff, 0x44, 0xfffffffc, 0x5}, &(0x7f00000003c0)=0x9c) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80080000, &(0x7f0000000180)="e5fe3bd22a79b69680d2fda017ee1289e45106cb2d00e5afa665be98cfe3a3db5745bbb68af6089f7a82db93f5bc78702c865bd4e0129c5acfbf58ca41", &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="31071385ea3998969fa736a706892b13ba506cc0af2921418ecbfdfa3ca10cb4e52b34b307f9a09957423fd5afc8223669b37f70a1b8d4fc7cdf7034f9ade34117e5dd2828409f5f7413ad857485a7977da337f1d25ff323eaeba28d67a69742d7f748d12d5ae261ecf3964c7b2eb5cebd871956083750a0bd319c4a6ffe4b769b2a9593778b7fcb0b38af2d8eebee05afcc01795cd027cb700b8fdd7ed7acf14faeaf96629374093aecdc0987b05874b23f3c9094f063993500417c12d3") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000002000000000400000200000d00000000000000000000000001000000020000000000"], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x38a, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:15 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x1f000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1117.692391][ T6440] BPF:[1] FUNC_PROTO (anon) [ 1117.697017][ T6440] BPF:return=0 args=( [ 1117.701003][ T6440] BPF:0 (anon) [ 1117.707224][ T6440] BPF:, 2 [ 1117.710263][ T6440] BPF:) [ 1117.714268][ T6440] BPF: [ 1117.717039][ T6440] BPF:Invalid arg#1 [ 1117.720841][ T6440] BPF: [ 1117.720841][ T6440] [ 1117.743680][ T6442] BPF:[1] FUNC_PROTO (anon) [ 1117.748373][ T6442] BPF:return=0 args=( [ 1117.753576][ T6442] BPF:7 (anon) [ 1117.757054][ T6442] BPF:, 0 [ 1117.760083][ T6442] BPF:, vararg [ 1117.764795][ T6442] BPF:) [ 1117.767567][ T6442] BPF: [ 1117.770378][ T6442] BPF:Invalid arg#1 [ 1117.778240][ T6442] BPF: [ 1117.778240][ T6442] [ 1117.841541][ T6451] BPF:[1] FUNC_PROTO (anon) [ 1117.847516][ T6451] BPF:return=0 args=( [ 1117.851505][ T6451] BPF:0 [ 1117.855677][ T6451] BPF:, vararg [ 1117.859059][ T6451] BPF:) [ 1117.862823][ T6451] BPF: [ 1117.865593][ T6451] BPF:Invalid arg#2 [ 1117.869397][ T6451] BPF: [ 1117.869397][ T6451] [ 1117.895527][ T6453] BPF:[1] FUNC_PROTO (anon) [ 1117.900233][ T6453] BPF:return=0 args=( [ 1117.905426][ T6453] BPF:0 [ 1117.908480][ T6453] BPF:, vararg [ 1117.913248][ T6453] BPF:) [ 1117.916016][ T6453] BPF: [ 1117.918780][ T6453] BPF:Invalid arg#2 [ 1117.922626][ T6453] BPF: [ 1117.922626][ T6453] [ 1118.088962][ T6441] BPF:[1] FUNC_PROTO (anon) [ 1118.094974][ T6441] BPF:return=0 args=( [ 1118.098975][ T6441] BPF:7 (anon) [ 1118.103577][ T6441] BPF:, 0 [ 1118.106610][ T6441] BPF:, vararg [ 1118.109984][ T6441] BPF:) [ 1118.114137][ T6441] BPF: [ 1118.116909][ T6441] BPF:Invalid arg#1 [ 1118.120712][ T6441] BPF: [ 1118.120712][ T6441] [ 1118.133992][ T6464] device vlan1318 entered promiscuous mode 01:13:15 executing program 0: syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000140)={0x2}) 01:13:15 executing program 3: ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0xff, 0x9, 0x37, 0x5c, @remote, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8, 0x1, 0x1, 0x7fffffff}}) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000200)=""/211, 0x36, 0xd3, 0x8}, 0x20) fsetxattr(r0, &(0x7f0000000180)=@known='system.posix_acl_access\x00', &(0x7f00000001c0)='\x00', 0x1, 0x1) 01:13:15 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x20000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:15 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x8}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000100)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001800), &(0x7f0000001840)=0xc) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) r8 = socket$packet(0x11, 0x2, 0x300) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r7, @ANYBLOB="018400b8da000000"], 0x20}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r8, 0x89fa, &(0x7f0000000700)={'syztnl0\x00', &(0x7f0000000680)={'ip6_vti0\x00', r7, 0x29, 0x4, 0x9, 0x1f, 0x48, @dev={0xfe, 0x80, '\x00', 0x12}, @dev={0xfe, 0x80, '\x00', 0x34}, 0x7800, 0x7, 0x40, 0xfffffe00}}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000840)={&(0x7f0000001980)=ANY=[@ANYBLOB="c8000000", @ANYRES16=0x0, @ANYBLOB="000126bd7000fcdbdf251900000038000180080003000000000014000200776c616e300000000000000000000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000480001801400020074756e6c30000000000000000000000008000300000000000800030001000000080003000000000008000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="34008e01801400020076657468305f746f5f7465ff6d0000001400020076657468315f746f5f626f6e6400000008000100", @ANYRES32=r7, @ANYBLOB], 0xc8}, 0x1, 0x0, 0x0, 0x40000}, 0x8084) sendmsg$nl_route_sched(r4, &(0x7f0000001940)={&(0x7f0000001880), 0xc, &(0x7f0000001900)={&(0x7f00000018c0)=@gettclass={0x24, 0x2a, 0x10, 0x70bd26, 0x25dfdbfc, {0x0, 0x0, 0x0, r7, {0x2, 0xa}, {0x2, 0xfff1}, {0xfff1, 0xfffa}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000001}, 0x8054) sendmsg$nl_route(r3, &(0x7f00000017c0)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001780)={&(0x7f0000001740)=ANY=[@ANYBLOB="3c0000006a00100028bd7000ff0000000008000500", @ANYRES32=r7, @ANYBLOB="080001000000000004000b0004000b00080001000100000004000900"], 0x3c}, 0x1, 0x0, 0x0, 0x4040800}, 0x4881) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r2}}]}) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x3, 0x9, &(0x7f00000015c0)=[{&(0x7f00000000c0)="5a572eb2b3b58d6f189640f532e0a6a6761d568b2dce2a5ebd9efaeb0255b68305728b91d5b9acb3e8c635949929ed2a62a3cf2e528654ba9ec477b8c7e226a6bd7c89b731f4a756e21b6deab4c1bc916f46b0cd713c457388a1fe14e0a20c2982c6fd09b00ea4225e", 0x69, 0x4}, {&(0x7f0000000200)="b737e357dfd08d30269586bb31f714d9d72be17a1c63235395eeb958ea49ab4549fc6decb9d1bc077a8c8bd0df32a75402f3f623e80b01b5344b085bb9b0fcb9c90318e3304685a45080500b621d654a2daee518ee2706b36324014c2c34e4c34eac027fb499893e0a5222efd6b7744686ab314d1314e1777aca1aa9300e559d837a2eb6f4048dbc4bd238029ff83265b6d72dffc9142e5fa91acc", 0x9b, 0x7}, {&(0x7f0000000140)="22bcbcddf1494580b10854758a7e2cd3e15f30add389d068aabd02f87d035c6831ab4aa85c276ee579ff2cbec0308233fc8819f6", 0x34, 0x250a6a5a}, {&(0x7f0000000180)="6e0adde70a0bc10823598bb0905d783611eb659e3f12b744efcad7548073de6560f9a82bbc879f0e55", 0x29, 0x5}, {&(0x7f00000002c0)="e1c3183b132aa5cf274372392885edb5ddfc788d2e8e21f742f6ca3661351edf3501ff39db7f3d6b92f99e94922cc5968c67d3b1ef1b4f362a12388fd3be835a1973eff7", 0x44}, {&(0x7f0000000340)="022768d80a878538f57b1141ef1c4034ae9d09f3698c49ba93bae3ec477e90d23fae7d6e3c75d054e2c32a28e97555c32b79d08cbfa910caf2e665effaf9023c987cb76a7414682c4aef8b245e585adeed91ac4c6cbb04608be1d137ba5baccfcaec577a87303f39168b548f4c544344a3d97ec4da05130c767668d079593303456754f5d236394bd1a6bc4a4ff1a96a76336ecc125721be937479235748198b6c5737d4968d9d1834c89dcf553fdacd2d0b047850f1f2cf61d770706644ea2e898f75cebe1410169f90cec96947e00b5560ce426a3f942e6d3484703d642caa8cf3f3a5648f03", 0xe7, 0x4}, {&(0x7f0000000500)="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", 0x1000, 0x2}, {&(0x7f0000000440)="b476c2e59e89feff70b176f2a3c9f09762cf1b5540ac3feb43dc66d241625b9c6c0b83900ccc7648b8b7927ada2fe3d9b20c9d8f1765d634f3291bb16fa6", 0x3e, 0x8}, {&(0x7f0000001500)="789913a24110ea8806f99e89fe988a2ee99c647353b1821d08065cbb88d9cbb7883a1b6abbd5cfa796cefa133b1ee33460a61214dfa335c8534d4fd79fe1705ad8970dc284cca7456dc96c66503042571de6fef6be02081cc6b5cce6b8e48d031870cf447334865c110d0dd527fdad13e6013ae119452d9c2f98f6c98b8dd27bbc13c0a207f1e67959e00cfda0d786738f1c191ae0a8d19f1977393dfdc0520076e6600d", 0xa4, 0x7fffffff}], 0x1, &(0x7f00000016c0)=ANY=[@ANYBLOB='smackfsfloor=.(:#[,euid<', @ANYRESDEC=r1, @ANYBLOB=',subj_user=,\x00']) 01:13:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x390, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1118.284735][ T6481] BPF:[1] FUNC_PROTO (anon) [ 1118.289405][ T6481] BPF:return=0 args=( [ 1118.290077][ T6484] BPF:[1] FUNC_PROTO (anon) [ 1118.294815][ T6481] BPF:8 (anon) [ 1118.299230][ T6484] BPF:return=0 args=( [ 1118.303584][ T6481] BPF:, 0 [ 1118.306596][ T6484] BPF:0 [ 1118.309600][ T6481] BPF:, vararg [ 1118.314863][ T6484] BPF:, vararg [ 1118.317314][ T6481] BPF:) [ 1118.317326][ T6481] BPF: [ 1118.317336][ T6481] BPF:Invalid arg#1 [ 1118.317346][ T6481] BPF: [ 1118.317346][ T6481] [ 1118.336273][ T6484] BPF:) [ 1118.339068][ T6484] BPF: [ 1118.341871][ T6484] BPF:Invalid arg#2 [ 1118.343687][ T6482] BPF:[1] FUNC_PROTO (anon) [ 1118.345674][ T6484] BPF: [ 1118.345674][ T6484] [ 1118.356772][ T6482] BPF:return=0 args=( [ 1118.360768][ T6482] BPF:0 (anon) [ 1118.365277][ T6482] BPF:, 2 [ 1118.368316][ T6482] BPF:) [ 1118.371081][ T6482] BPF: [ 1118.375095][ T6482] BPF:Invalid arg#1 [ 1118.378909][ T6482] BPF: [ 1118.378909][ T6482] [ 1118.396129][ T6488] BPF:[1] FUNC_PROTO (anon) [ 1118.399674][ T6487] BPF:[1] FUNC_PROTO (anon) [ 1118.400781][ T6488] BPF:return=0 args=( [ 1118.406695][ T6487] BPF:return=0 args=( [ 1118.409569][ T6488] BPF:0 [ 1118.409580][ T6488] BPF:, vararg [ 1118.413577][ T6487] BPF:8 (anon) [ 1118.416401][ T6488] BPF:) [ 1118.419767][ T6487] BPF:, 0 [ 1118.423146][ T6488] BPF: [ 1118.423157][ T6488] BPF:Invalid arg#2 [ 1118.425889][ T6487] BPF:, vararg [ 1118.425899][ T6487] BPF:) [ 1118.428894][ T6488] BPF: [ 1118.428894][ T6488] [ 1118.446456][ T6487] BPF: [ 1118.449218][ T6487] BPF:Invalid arg#1 [ 1118.453094][ T6487] BPF: [ 1118.453094][ T6487] 01:13:16 executing program 0: syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000140)={0x2}) 01:13:16 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0xa}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1118.607922][ T6500] device vlan1319 entered promiscuous mode [ 1118.628690][ T6489] BPF:[1] FUNC_PROTO (anon) [ 1118.634717][ T6489] BPF:return=0 args=( [ 1118.638717][ T6489] BPF:0 (anon) [ 1118.642704][ T6489] BPF:, 2 [ 1118.645729][ T6489] BPF:) [ 1118.648527][ T6489] BPF: [ 1118.651294][ T6489] BPF:Invalid arg#1 [ 1118.655193][ T6489] BPF: [ 1118.655193][ T6489] [ 1118.685596][ T6511] hfsplus: gid requires an argument [ 1118.690820][ T6511] hfsplus: unable to parse mount options [ 1118.740084][ T6520] BPF:[1] FUNC_PROTO (anon) [ 1118.746247][ T6520] BPF:return=0 args=( [ 1118.748579][ T6521] BPF:[1] FUNC_PROTO (anon) [ 1118.750241][ T6520] BPF:10 (anon) [ 1118.750255][ T6520] BPF:, 0 [ 1118.750264][ T6520] BPF:, vararg [ 1118.750274][ T6520] BPF:) [ 1118.750283][ T6520] BPF: [ 1118.750293][ T6520] BPF:Invalid arg#1 [ 1118.750302][ T6520] BPF: [ 1118.750302][ T6520] [ 1118.755982][ T6521] BPF:return=0 args=( [ 1118.786498][ T6521] BPF:10 (anon) [ 1118.789959][ T6521] BPF:, 0 [ 1118.793942][ T6521] BPF:, vararg [ 1118.797329][ T6521] BPF:) [ 1118.800089][ T6521] BPF: [ 1118.804132][ T6521] BPF:Invalid arg#1 [ 1118.807939][ T6521] BPF: [ 1118.807939][ T6521] 01:13:16 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x2e000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:16 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x11}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x3a8, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1118.853535][ T6497] loop5: detected capacity change from 0 to 264192 [ 1118.862968][ T6497] FAT-fs (loop5): Unrecognized mount option "smackfsfloor=.(:#[" or missing value 01:13:16 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, 0x0) 01:13:16 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0x31, 0x8}, 0x20) [ 1119.104721][ T6560] BPF:[1] FUNC_PROTO (anon) [ 1119.108445][ T6563] hfsplus: gid requires an argument [ 1119.109381][ T6560] BPF:return=0 args=( [ 1119.115712][ T6563] hfsplus: unable to parse mount options [ 1119.118716][ T6560] BPF:0 [ 1119.129540][ T6560] BPF:, vararg [ 1119.134230][ T6560] BPF:) [ 1119.137369][ T6560] BPF: [ 1119.140138][ T6560] BPF:Invalid arg#2 [ 1119.145106][ T6560] BPF: [ 1119.145106][ T6560] [ 1119.148791][ T6574] device vlan1320 entered promiscuous mode [ 1119.171098][ T6568] BPF:[1] FUNC_PROTO (anon) [ 1119.177064][ T6568] BPF:return=0 args=( [ 1119.181064][ T6568] BPF:17 (anon) [ 1119.185999][ T6568] BPF:, 0 [ 1119.189037][ T6568] BPF:, vararg [ 1119.192460][ T6568] BPF:) [ 1119.195226][ T6568] BPF: [ 1119.197992][ T6568] BPF:Invalid arg#1 [ 1119.201840][ T6568] BPF: [ 1119.201840][ T6568] 01:13:16 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000040)=""/211, 0x26, 0xd3, 0x8}, 0x20) clone(0x110400, &(0x7f0000000380)="e67ae7ad06c06a6d6960c50754346f21aacadfc229622c0709a8fac0ff0a3f5d1af06e8e25332e29feca8c7c53a90ae87cc1657e49167b2dc972", &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="ec0b8c4810e96b12892257dfcfbc2aa90d369a8d4eabeac803ee1d0abaf28a988ea5cc4df9ce72e2b01d019d48868eeba47a362b790e95d97c0716844f3911a92dfc6b686a11b99140717a934908839dfee93ade5876b42c8fb2879347cab54c2acddcac688e24ff8aa85292b7b53bc8b42238394166f9d87ceade446d745113b2442f1ff46e6c7c35f352f17beb1f6ff5ada8bba7df2810a0fcebaa239453e646c7e492") clone(0x20000000, &(0x7f0000000180)="24a2c80053ac25b750af9a125c45c106170b4af8b63b3b0db5c52b4f907e59c9ceb7a73246d186ac7659f977155d961714fc13ceafc16127963fbb6242575bb54a06a7759239520667e10cb9108f5dc74daa4e404277d2eca397b34854bb3da244608fd2129e650525510fcb6d86bef70cf8795925a4480b1a5a2ed8d93f6ff1f6a2775840318ab67ba247ab196682969d3cb28fa9447cd41e6295cd6468ee2ea436551f56ddba7d110d50032617d409ddf12cd23d4c91cc3523d145127dcc3d2fe4a831e43cf087e2", &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="bc4bb2cc1a63fd60689d1f5d063289368d509086b1c703d4d32dffd2e8f89c0f22558173105f8bd69befd8c17e98c58d4e85ed5a6f2cd033e1db2f20655f8fcf07338c8255c2b1cad8656f2432af1037") [ 1119.230847][ T6565] BPF:[1] FUNC_PROTO (anon) [ 1119.238717][ T6565] BPF:return=0 args=( [ 1119.242777][ T6565] BPF:0 [ 1119.245629][ T6565] BPF:, vararg [ 1119.249006][ T6565] BPF:) [ 1119.251800][ T6565] BPF: [ 1119.254563][ T6565] BPF:Invalid arg#2 [ 1119.258365][ T6565] BPF: [ 1119.258365][ T6565] 01:13:16 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, 0x0) 01:13:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x3}, &(0x7f0000000180)=0x8) read(r0, &(0x7f0000000040)=""/251, 0xfb) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)=ANY=[@ANYBLOB="67696493", @ANYRESHEX=r1, @ANYBLOB=',\x00']) 01:13:16 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x24}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x3bc, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:17 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x48000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:17 executing program 3: clock_gettime(0x0, &(0x7f00000027c0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000000200)=""/131, 0x83}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/4096, 0x1000}, {&(0x7f00000022c0)=""/239, 0xef}, {&(0x7f00000023c0)=""/47, 0x2f}, {&(0x7f0000002400)=""/243, 0xf3}, {&(0x7f0000002500)=""/255, 0xff}, {&(0x7f0000002600)=""/159, 0x9f}], 0x8, &(0x7f0000002740)=""/64, 0x40}, 0x400}], 0x1, 0x40000000, &(0x7f0000002800)={r0, r1+60000000}) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000002880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r2, &(0x7f0000002b40)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000002b00)={&(0x7f00000028c0)={0x234, r3, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0xf0}, {0x6, 0x16, 0x2}, {0x5}, {0x6, 0x11, 0x400}, {0x8, 0xb, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7}, {0x5}, {0x6, 0x11, 0x7ff}, {0x8, 0xb, 0x9}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x7fff}, {0x6, 0x16, 0x40}, {0x5}, {0x6, 0x11, 0x20}, {0x8, 0xb, 0x8001}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x10000}, {0x6, 0x16, 0x4}, {0x5}, {0x6, 0x11, 0x401}, {0x8, 0xb, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0xfffffff8}, {0x6, 0x16, 0x7284}, {0x5}, {0x6, 0x11, 0x5}, {0x8, 0xb, 0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x3ff}, {0x6, 0x16, 0xb}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x3}, {0x8, 0xb, 0x6}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x1}, {0x6, 0x16, 0x6}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x75}, {0x8, 0xb, 0x631}}]}, 0x234}, 0x1, 0x0, 0x0, 0x4000c10}, 0x40000) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb030018000000000000001c0000001c00000002000000000000000200000d00000000000000000000000001000000020000000000"], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:17 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, 0x0) [ 1119.667555][ T6604] BPF:[1] FUNC_PROTO (anon) [ 1119.673396][ T6604] BPF:return=0 args=( [ 1119.677399][ T6604] BPF:36 (anon) [ 1119.680866][ T6604] BPF:, 0 [ 1119.685095][ T6604] BPF:, vararg [ 1119.688478][ T6604] BPF:) [ 1119.691301][ T6604] BPF: [ 1119.695394][ T6604] BPF:Invalid arg#1 [ 1119.699209][ T6604] BPF: [ 1119.699209][ T6604] [ 1119.726348][ T6614] hfsplus: unable to parse mount options [ 1119.727961][ T6606] BPF:[1] FUNC_PROTO (anon) [ 1119.737828][ T6606] BPF:return=0 args=( [ 1119.743169][ T6606] BPF:36 (anon) [ 1119.746639][ T6606] BPF:, 0 [ 1119.749664][ T6606] BPF:, vararg [ 1119.753094][ T6606] BPF:) [ 1119.755860][ T6606] BPF: [ 1119.758622][ T6606] BPF:Invalid arg#1 [ 1119.762475][ T6606] BPF: [ 1119.762475][ T6606] [ 1119.768115][ T6622] device vlan1321 entered promiscuous mode [ 1119.826798][ T6627] BPF:[1] FUNC_PROTO (anon) [ 1119.832846][ T6627] BPF:return=0 args=( [ 1119.836849][ T6627] BPF:0 [ 1119.839704][ T6627] BPF:, vararg [ 1119.844383][ T6627] BPF:) [ 1119.847181][ T6627] BPF: [ 1119.849944][ T6627] BPF:Invalid arg#2 [ 1119.855222][ T6627] BPF: [ 1119.855222][ T6627] [ 1119.879895][ T6626] BPF:Unsupported version [ 1119.895983][ T6629] BPF:[1] FUNC_PROTO (anon) [ 1119.900661][ T6629] BPF:return=0 args=( [ 1119.905914][ T6629] BPF:0 [ 1119.908773][ T6629] BPF:, vararg [ 1119.913241][ T6629] BPF:) [ 1119.916009][ T6629] BPF: [ 1119.918769][ T6629] BPF:Invalid arg#2 [ 1119.923763][ T6629] BPF: [ 1119.923763][ T6629] [ 1119.928383][ T6635] BPF:Unsupported version 01:13:17 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000140)) 01:13:17 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000040)=""/211, 0x26, 0xd3, 0x8}, 0x20) 01:13:17 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x26}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x3d2, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:17 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x4c000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:17 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x28100, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f00000001c0)={0x7, 0x102, 0x2, {0x0, 0x800, 0x4, 0x9}}) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1120.167043][ T6648] BPF:[1] FUNC_PROTO (anon) [ 1120.174062][ T6648] BPF:return=0 args=( [ 1120.178102][ T6648] BPF:38 (anon) [ 1120.182760][ T6648] BPF:, 0 [ 1120.185791][ T6648] BPF:, vararg [ 1120.189169][ T6648] BPF:) [ 1120.193397][ T6648] BPF: [ 1120.196173][ T6648] BPF:Invalid arg#1 [ 1120.199982][ T6648] BPF: [ 1120.199982][ T6648] [ 1120.210764][ T6651] BPF:[1] FUNC_PROTO (anon) [ 1120.216673][ T6651] BPF:return=0 args=( [ 1120.220669][ T6651] BPF:38 (anon) [ 1120.225383][ T6651] BPF:, 0 [ 1120.228414][ T6651] BPF:, vararg [ 1120.232894][ T6651] BPF:) [ 1120.235661][ T6651] BPF: [ 1120.238422][ T6651] BPF:Invalid arg#1 [ 1120.243269][ T6651] BPF: [ 1120.243269][ T6651] [ 1120.300987][ T6653] device vlan1322 entered promiscuous mode [ 1120.359467][ T6663] BPF:[1] FUNC_PROTO (anon) [ 1120.365469][ T6663] BPF:return=0 args=( [ 1120.369593][ T6663] BPF:0 (anon) [ 1120.373770][ T6663] BPF:, 2 [ 1120.376802][ T6663] BPF:) [ 1120.379567][ T6663] BPF: [ 1120.382393][ T6663] BPF:Invalid arg#1 [ 1120.384780][ T6666] BPF:[1] FUNC_PROTO (anon) [ 1120.386265][ T6663] BPF: [ 1120.386265][ T6663] [ 1120.397005][ T6666] BPF:return=0 args=( [ 1120.401013][ T6666] BPF:0 [ 1120.403341][ T6664] BPF:[1] FUNC_PROTO (anon) [ 1120.405122][ T6666] BPF:, vararg [ 1120.408489][ T6664] BPF:return=0 args=( [ 1120.412980][ T6666] BPF:) [ 1120.412992][ T6666] BPF: [ 1120.413003][ T6666] BPF:Invalid arg#2 [ 1120.413013][ T6666] BPF: [ 1120.413013][ T6666] [ 1120.435098][ T6664] BPF:0 (anon) [ 1120.438481][ T6664] BPF:, 2 [ 1120.443006][ T6664] BPF:) [ 1120.445774][ T6664] BPF: [ 1120.448533][ T6664] BPF:Invalid arg#1 [ 1120.453531][ T6664] BPF: [ 1120.453531][ T6664] [ 1120.455641][ T6667] BPF:[1] FUNC_PROTO (anon) [ 1120.464259][ T6667] BPF:return=0 args=( [ 1120.468459][ T6667] BPF:0 [ 1120.472516][ T6667] BPF:, vararg [ 1120.475892][ T6667] BPF:) [ 1120.478654][ T6667] BPF: [ 1120.481489][ T6667] BPF:Invalid arg#2 [ 1120.485291][ T6667] BPF: [ 1120.485291][ T6667] [ 1120.519640][ T6673] hfsplus: unable to parse mount options 01:13:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, 0x1, 0x7, 0x5, 0x0, 0x0, {0x7, 0x0, 0x7}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1ff}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x9}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0x5) 01:13:18 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000140)) 01:13:18 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x48}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:18 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x5f000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:18 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xffffffffffffff24, [@func={0xc, 0x0, 0x0, 0xc, 0x2}, @restrict={0xb, 0x0, 0x0, 0xb, 0x4}]}}, &(0x7f0000000180)=""/211, 0x26, 0xd3, 0x8}, 0x20) clone(0x0, &(0x7f00000000c0)="0c59308502c5f72e9d0415ac97aa2d5e2c3dc6dfc767e37965458e0d2992ccf329ddcbaab0140c32d90fde08c3ce488625df6f92c611908054e72fccb90c2e19499034ff0e42223cfa359ce1c4aa3a572bd06742", &(0x7f0000001280), &(0x7f00000012c0), &(0x7f0000001300)="8a06b592d55205f6be0999d578ccb411ae18051f4f6e7e24f35fc2ceb6f2552e9bfc804ea1d86f207200d13b6d15b1a2695f4d03e88f1fc62e76280a556050d789c3bd4146d7d28b894f1d48e4e6de3ec9e82fa58bf9e49b55838c5f2d514892d5117fd498366020bcf6bba0eef6aa89c46cd6393eea1a5532c99aeec9d12415262526f1e302dcd9352782562bac24809cbbd19c09a9463e54a4c28bda81e26bfc27e9a317") bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r0, 0x10, &(0x7f0000000000)={&(0x7f0000000280)=""/4096, 0x1000}}, 0x10) 01:13:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x3e2, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1120.754981][ T6683] BPF:[1] FUNC_PROTO (anon) [ 1120.759670][ T6683] BPF:return=0 args=( [ 1120.766190][ T6683] BPF:0 [ 1120.769096][ T6683] BPF:, vararg [ 1120.770588][ T6685] BPF:Total section length too long [ 1120.772536][ T6683] BPF:) [ 1120.772548][ T6683] BPF: [ 1120.772559][ T6683] BPF:Invalid arg#2 [ 1120.772569][ T6683] BPF: [ 1120.772569][ T6683] [ 1120.791411][ T6684] BPF:[1] FUNC_PROTO (anon) [ 1120.799208][ T6684] BPF:return=0 args=( [ 1120.800597][ T6688] BPF:[1] FUNC_PROTO (anon) [ 1120.805427][ T6684] BPF:0 [ 1120.808941][ T6688] BPF:return=0 args=( [ 1120.811819][ T6684] BPF:, vararg [ 1120.811831][ T6684] BPF:) [ 1120.811839][ T6684] BPF: [ 1120.811849][ T6684] BPF:Invalid arg#2 [ 1120.811858][ T6684] BPF: [ 1120.811858][ T6684] [ 1120.836871][ T6688] BPF:72 (anon) [ 1120.840340][ T6688] BPF:, 0 [ 1120.844667][ T6688] BPF:, vararg [ 1120.848049][ T6688] BPF:) [ 1120.850832][ T6688] BPF: [ 1120.854930][ T6688] BPF:Invalid arg#1 [ 1120.858756][ T6688] BPF: [ 1120.858756][ T6688] [ 1120.874060][ T6691] BPF:[1] FUNC_PROTO (anon) [ 1120.879142][ T6691] BPF:return=0 args=( [ 1120.884618][ T6691] BPF:72 (anon) [ 1120.888090][ T6691] BPF:, 0 [ 1120.891114][ T6691] BPF:, vararg [ 1120.894523][ T6691] BPF:) [ 1120.897283][ T6691] BPF: [ 1120.900038][ T6691] BPF:Invalid arg#1 [ 1120.903883][ T6691] BPF: [ 1120.903883][ T6691] 01:13:18 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x60000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:18 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000140)) [ 1120.989451][ T6689] BPF:Total section length too long [ 1121.003259][ T6703] hfsplus: gid requires an argument [ 1121.008477][ T6703] hfsplus: unable to parse mount options 01:13:18 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xc, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) clone(0x101280, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="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") [ 1121.076341][ T6697] device vlan1323 entered promiscuous mode [ 1121.162670][ T6718] BPF:[1] FUNC_PROTO (anon) [ 1121.167332][ T6718] BPF:return=0 args=( [ 1121.173731][ T6718] BPF:0 [ 1121.176623][ T6718] BPF:, vararg [ 1121.180004][ T6718] BPF:) [ 1121.183962][ T6718] BPF: [ 1121.186743][ T6718] BPF:Invalid arg#2 [ 1121.187093][ T6717] hfsplus: gid requires an argument [ 1121.190547][ T6718] BPF: [ 1121.190547][ T6718] [ 1121.196939][ T6717] hfsplus: unable to parse mount options [ 1121.238095][ T6719] BPF:[1] FUNC_PROTO (anon) [ 1121.245235][ T6719] BPF:return=0 args=( [ 1121.249238][ T6719] BPF:0 [ 1121.253224][ T6719] BPF:, vararg [ 1121.256621][ T6719] BPF:) [ 1121.259378][ T6719] BPF: [ 1121.263237][ T6719] BPF:Invalid arg#2 [ 1121.267135][ T6719] BPF: [ 1121.267135][ T6719] 01:13:18 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x4c}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1121.284655][ T6730] BPF:[1] FUNC_PROTO (anon) [ 1121.289548][ T6730] BPF:return=0 args=( [ 1121.294821][ T6730] BPF:0 (anon) [ 1121.298206][ T6730] BPF:, 2 (invalid-name-offset) [ 1121.303139][ T6730] BPF:) [ 1121.305911][ T6730] BPF: [ 1121.308675][ T6730] BPF:Invalid arg#1 [ 1121.312546][ T6730] BPF: [ 1121.312546][ T6730] 01:13:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x3ea, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1121.340049][ T6732] BPF:[1] FUNC_PROTO (anon) [ 1121.345836][ T6732] BPF:return=0 args=( [ 1121.349833][ T6732] BPF:0 (anon) [ 1121.354625][ T6732] BPF:, 2 (invalid-name-offset) [ 1121.359489][ T6732] BPF:) [ 1121.363528][ T6732] BPF: [ 1121.366297][ T6732] BPF:Invalid arg#1 [ 1121.370094][ T6732] BPF: [ 1121.370094][ T6732] 01:13:18 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x26000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:19 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x68000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:19 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x60}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:19 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) r1 = dup3(r0, r0, 0x80000) ioctl$DRM_IOCTL_MODE_ADDFB2(r1, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800, 0x0, 0x3], [0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x1]}) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0xf50f, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000500000d00000000040000000000000007000000020000000d0000000500000003000000010000000a000000050000000000be1fa71ce1623943b722fb240c0ed9e4e2b8c5fdce82095ccad40ad8d277883a35a836bd9f570dae47c24e9f64df77bfda38e7385e66b6d89d06d2f00adbf106602c40f553b2d3949a28a83ff11f569e3ace1c253d2ee59a51936592099ed9534297b2b2b1f46551ec994031dae85c6bc20fee6d8bd5f50265f5d75f849837c98a6881ac5939"], &(0x7f0000000040)=""/196, 0x4e, 0xc4, 0x8}, 0x20) [ 1121.555250][ T6746] BPF:[1] FUNC_PROTO (anon) [ 1121.560113][ T6746] BPF:return=0 args=( [ 1121.565755][ T6746] BPF:76 (anon) [ 1121.569227][ T6746] BPF:, 0 [ 1121.573539][ T6746] BPF:, vararg [ 1121.576918][ T6746] BPF:) [ 1121.579686][ T6746] BPF: [ 1121.583723][ T6746] BPF:Invalid arg#1 [ 1121.587542][ T6746] BPF: [ 1121.587542][ T6746] [ 1121.635415][ T6754] BPF:[1] FUNC_PROTO (anon) [ 1121.636598][ T6739] device vlan1324 entered promiscuous mode [ 1121.640029][ T6754] BPF:return=0 args=( [ 1121.650007][ T6754] BPF:0 (invalid-name-offset) [ 1121.657168][ T6754] BPF:, 0 [ 1121.660208][ T6754] BPF:, vararg [ 1121.664781][ T6754] BPF:) [ 1121.667558][ T6754] BPF: [ 1121.670329][ T6754] BPF:Invalid arg#1 [ 1121.675355][ T6754] BPF: [ 1121.675355][ T6754] [ 1121.764032][ T6763] BPF:[1] FUNC_PROTO (anon) [ 1121.768732][ T6763] BPF:return=0 args=( [ 1121.775004][ T6763] BPF:0 [ 1121.777871][ T6763] BPF:, vararg [ 1121.782678][ T6763] BPF:) [ 1121.785450][ T6763] BPF: [ 1121.788248][ T6763] BPF:Invalid arg#2 [ 1121.793491][ T6763] BPF: [ 1121.793491][ T6763] [ 1121.793844][ T6765] BPF:[1] FUNC_PROTO (anon) [ 1121.804413][ T6765] BPF:return=0 args=( [ 1121.808410][ T6765] BPF:0 (invalid-name-offset) [ 1121.813164][ T6765] BPF:, 2 (invalid-name-offset) [ 1121.818023][ T6765] BPF:, 5 (invalid-name-offset) [ 1121.822969][ T6765] BPF:, 1 (invalid-name-offset) [ 1121.825074][ T6764] BPF:[1] FUNC_PROTO (anon) [ 1121.827853][ T6765] BPF:, 5 (invalid-name-offset) [ 1121.827866][ T6765] BPF:) [ 1121.827875][ T6765] BPF: [ 1121.827885][ T6765] BPF:Invalid arg#1 [ 1121.827895][ T6765] BPF: [ 1121.827895][ T6765] [ 1121.855867][ T6764] BPF:return=0 args=( [ 1121.859947][ T6764] BPF:0 [ 1121.863978][ T6764] BPF:, vararg [ 1121.866021][ T6766] BPF:[1] FUNC_PROTO (anon) [ 1121.867352][ T6764] BPF:) [ 1121.867362][ T6764] BPF: [ 1121.867371][ T6764] BPF:Invalid arg#2 [ 1121.867381][ T6764] BPF: [ 1121.867381][ T6764] [ 1121.888655][ T6766] BPF:return=0 args=( [ 1121.893674][ T6766] BPF:0 (invalid-name-offset) [ 1121.898361][ T6766] BPF:, 2 (invalid-name-offset) [ 1121.904470][ T6766] BPF:, 5 (invalid-name-offset) [ 1121.909329][ T6766] BPF:, 1 (invalid-name-offset) [ 1121.915392][ T6766] BPF:, 5 (invalid-name-offset) [ 1121.920245][ T6766] BPF:) [ 1121.923079][ T6766] BPF: [ 1121.925842][ T6766] BPF:Invalid arg#1 [ 1121.929646][ T6766] BPF: [ 1121.929646][ T6766] 01:13:19 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x26000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x3f2, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:19 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x6c000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1121.960607][ T6771] BPF:[1] FUNC_PROTO (anon) [ 1121.966747][ T6771] BPF:return=0 args=( [ 1121.970749][ T6771] BPF:96 (anon) [ 1121.975491][ T6771] BPF:, 0 [ 1121.978527][ T6771] BPF:, vararg [ 1121.983155][ T6771] BPF:) [ 1121.985925][ T6771] BPF: [ 1121.988700][ T6771] BPF:Invalid arg#1 [ 1121.993771][ T6771] BPF: [ 1121.993771][ T6771] 01:13:19 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) clone(0x100000, &(0x7f0000000180)="0e43a8e792d84fdf1a6c993d4c15173e97e75bd2004db5bb80f97997112adda9fe38895c4613968b74e47ae1364b885f372092595f518dc40dd759eec7ae1c4285d83b31518a3b56ffb37f60ba3409557da3c427cddcbee41d95543f5fc45f389be301ec36", &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="d8c76207eebe67a9cee915ac9c812944978156fcf96581d6c63177e59a91bafe8e23fa2ae6259769dd634640244601099424845d39d6c0b1429204efc3a856ea36bdb036853870d31eb13fd89f210bfd17966f4488095499") 01:13:19 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x68}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1122.199027][ T6786] BPF:[1] FUNC_PROTO (anon) [ 1122.204775][ T6786] BPF:return=0 args=( [ 1122.208955][ T6786] BPF:0 (anon) [ 1122.213831][ T6786] BPF:, 2 [ 1122.216878][ T6786] BPF:) [ 1122.219637][ T6786] BPF: [ 1122.222461][ T6786] BPF:Invalid arg#1 [ 1122.226266][ T6786] BPF: [ 1122.226266][ T6786] [ 1122.253935][ T6789] device vlan1325 entered promiscuous mode [ 1122.296422][ T6790] BPF:[1] FUNC_PROTO (anon) [ 1122.299145][ T6788] BPF:[1] FUNC_PROTO (anon) [ 1122.301066][ T6790] BPF:return=0 args=( [ 1122.301082][ T6790] BPF:0 (invalid-name-offset) [ 1122.301095][ T6790] BPF:, 0 [ 1122.306831][ T6788] BPF:return=0 args=( [ 1122.309719][ T6790] BPF:, vararg [ 1122.309734][ T6790] BPF:) [ 1122.309743][ T6790] BPF: [ 1122.309754][ T6790] BPF:Invalid arg#1 [ 1122.309763][ T6790] BPF: [ 1122.309763][ T6790] [ 1122.323222][ T6800] BPF:[1] FUNC_PROTO (anon) 01:13:19 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x74000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1122.323240][ T6800] BPF:return=0 args=( [ 1122.323252][ T6800] BPF:0 [ 1122.323261][ T6800] BPF:, vararg [ 1122.323270][ T6800] BPF:) [ 1122.323279][ T6800] BPF: [ 1122.323288][ T6800] BPF:Invalid arg#2 [ 1122.323298][ T6800] BPF: [ 1122.323298][ T6800] [ 1122.370986][ T6788] BPF:0 (anon) [ 1122.374450][ T6788] BPF:, 2 [ 1122.377485][ T6788] BPF:) [ 1122.380249][ T6788] BPF: [ 1122.383086][ T6788] BPF:Invalid arg#1 [ 1122.386933][ T6788] BPF: [ 1122.386933][ T6788] 01:13:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="001c0000001c00000002000000000000000200000d000000000000000000000000000200"/51], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) clone(0x48000, &(0x7f0000000180)="eb3f43707dbe229c9e6f05c866fa3f442987eff5a04049a9e45306bd84cfa23b9c8204e1e77690d2830e5c2037631bc5d67210886bd2", &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="c74ec4a8150c02434b8b24794b0573fe6a578f8258ffa86bb75db471d1806839268ffad8bc7702a9444127e7655a706a0a5a9268ca2b6524148ba173fcb17c2943c880689d27af9e543da4e495931667c6b833a753229fd92f2266c2a99edf16d47dc66c11dc36c260050268415ecc5c94aa27fbada21198da7caa0c0ef49b98e063500e") [ 1122.495224][ T6808] BPF:[1] FUNC_PROTO (anon) [ 1122.499923][ T6808] BPF:return=0 args=( [ 1122.503390][ T6810] BPF:[1] FUNC_PROTO (anon) [ 1122.505009][ T6808] BPF:104 (anon) [ 1122.508514][ T6810] BPF:return=0 args=( [ 1122.513344][ T6808] BPF:, 0 [ 1122.513356][ T6808] BPF:, vararg [ 1122.513366][ T6808] BPF:) [ 1122.513376][ T6808] BPF: [ 1122.513386][ T6808] BPF:Invalid arg#1 [ 1122.513397][ T6808] BPF: [ 1122.513397][ T6808] [ 1122.538974][ T6810] BPF:104 (anon) [ 1122.542588][ T6810] BPF:, 0 01:13:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x3fc, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1122.545618][ T6810] BPF:, vararg [ 1122.548991][ T6810] BPF:) [ 1122.551810][ T6810] BPF: [ 1122.554574][ T6810] BPF:Invalid arg#1 [ 1122.558379][ T6810] BPF: [ 1122.558379][ T6810] 01:13:20 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x26000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:20 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x6c}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1122.682883][ T6813] BPF:[1] FUNC_PROTO (anon) [ 1122.687511][ T6813] BPF:return=0 args=( [ 1122.692916][ T6813] BPF:0 [ 1122.695776][ T6813] BPF:, vararg [ 1122.699149][ T6813] BPF:) [ 1122.703144][ T6813] BPF: [ 1122.705927][ T6813] BPF:Invalid arg#2 [ 1122.709735][ T6813] BPF: [ 1122.709735][ T6813] [ 1122.737860][ T6817] BPF:btf_header not found [ 1122.804229][ T6826] BPF:[1] FUNC_PROTO (anon) [ 1122.808913][ T6826] BPF:return=0 args=( [ 1122.815616][ T6826] BPF:0 (invalid-name-offset) [ 1122.820315][ T6826] BPF:, 0 [ 1122.824844][ T6826] BPF:, vararg [ 1122.828228][ T6826] BPF:) [ 1122.833058][ T6826] BPF: [ 1122.835841][ T6826] BPF:Invalid arg#1 [ 1122.839648][ T6826] BPF: [ 1122.839648][ T6826] [ 1122.840197][ T6817] BPF:btf_header not found [ 1122.877968][ T6821] device vlan1326 entered promiscuous mode 01:13:20 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x7a000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1122.955151][ T6835] BPF:[1] FUNC_PROTO (anon) [ 1122.959821][ T6835] BPF:return=0 args=( [ 1122.965357][ T6835] BPF:108 (anon) [ 1122.968916][ T6835] BPF:, 0 [ 1122.973163][ T6835] BPF:, vararg [ 1122.976540][ T6835] BPF:) [ 1122.979308][ T6835] BPF: [ 1122.983166][ T6835] BPF:Invalid arg#1 [ 1122.986982][ T6835] BPF: [ 1122.986982][ T6835] 01:13:20 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x26000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1123.026232][ T6837] BPF:[1] FUNC_PROTO (anon) [ 1123.031088][ T6837] BPF:return=0 args=( [ 1123.036462][ T6837] BPF:108 (anon) [ 1123.040020][ T6837] BPF:, 0 [ 1123.043114][ T6837] BPF:, vararg [ 1123.046498][ T6837] BPF:) [ 1123.049266][ T6837] BPF: [ 1123.052084][ T6837] BPF:Invalid arg#1 [ 1123.055893][ T6837] BPF: [ 1123.055893][ T6837] 01:13:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000100)) sendmmsg$inet6(r0, &(0x7f00000028c0)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x80000001, @mcast1, 0x9}, 0x1c, &(0x7f0000000480)=[{&(0x7f0000000200)="7ac97ab64cb28d", 0x7}, {0xfffffffffffffffc}, {&(0x7f0000000240)="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", 0xfe}, {&(0x7f0000000340)="6ea15be756ea9fb531f0b31912c5a3e552e3336aa34e69d3329ea595d4b6619a25455a812727d42f2d536be87f60850b55b0380403d8c9225030eadeacfc514ae8", 0x41}, {&(0x7f00000003c0)="ab6860f35d00a3a4427beda3f357d2df184077a9948c8c9f180fb48f46321395c040ca76864b3be7ad4ed8ced5c111f8124872ae5909e3abc335742c74f990418db5c1ba3c20171f8f695d5b26d1c241ff0320f777ecbf59ce33f5485a996538a3b5c233050d8ef59e50a83ccfaf3769c3cbc8ca1717253229d831374448832c9dd32c5fb40c8743ee4118cd07f79087068826", 0x93}], 0x5, &(0x7f0000000500)=[@rthdr_2292={{0xa8, 0x29, 0x39, {0x62, 0x12, 0x0, 0x7, 0x0, [@remote, @empty, @dev={0xfe, 0x80, '\x00', 0x25}, @private1, @ipv4={'\x00', '\xff\xff', @remote}, @ipv4={'\x00', '\xff\xff', @broadcast}, @loopback, @local, @remote]}}}, @tclass={{0x14, 0x29, 0x43, 0x26d}}, @rthdrdstopts={{0x38, 0x29, 0x37, {0x3c, 0x3, '\x00', [@hao={0xc9, 0x10, @private2}, @padn={0x1, 0x2, [0x0, 0x0]}, @ra={0x5, 0x2, 0x2831}]}}}, @rthdr_2292={{0xb8, 0x29, 0x39, {0x2c, 0x14, 0x1, 0x1, 0x0, [@private1={0xfc, 0x1, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x44}, @mcast1, @dev={0xfe, 0x80, '\x00', 0x36}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @dev={0xfe, 0x80, '\x00', 0x2d}, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @loopback}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}}}], 0x1b0}}, {{&(0x7f00000006c0)={0xa, 0x4e20, 0x4, @mcast2, 0x64}, 0x1c, &(0x7f0000000740)=[{&(0x7f0000000700)="b554b62f3bb5775c8afa4f7e0ebd2071066c5bcf2a8f798c821a6cbee885417639825021fac6d0812f51f75fe7de", 0x2e}], 0x1, &(0x7f0000000780)=[@rthdr={{0xa8, 0x29, 0x39, {0x32, 0x12, 0x1, 0x9, 0x0, [@mcast1, @loopback, @dev={0xfe, 0x80, '\x00', 0x26}, @private2, @ipv4={'\x00', '\xff\xff', @loopback}, @loopback, @private2, @private0, @empty]}}}], 0xa8}}, {{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000840)="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", 0x1000}, {&(0x7f0000001840)="4d9dcedbc6b769041f84f54f7665e0cb51963a748e61395a8dbc3467ce2409fdf1171b53d0b6d623886d72088b8b64a4dda5798c53048f4326c380ecb7", 0x3d}, {&(0x7f0000001880)}, {&(0x7f00000018c0)="79ad4d566f232df524925a97b91ef192eefa475545b4e9251f469535e2cf423daa4959f1630e6a2a2e3bc6143eb8c2f5dda6891626f5b1847638a9f2ada56dc82c", 0x41}], 0x4, &(0x7f0000001980)=[@rthdr_2292={{0x68, 0x29, 0x39, {0x29, 0xa, 0x1, 0x1f, 0x0, [@ipv4={'\x00', '\xff\xff', @multicast1}, @mcast1, @empty, @empty, @private2]}}}, @rthdrdstopts={{0x18, 0x29, 0x37, {0x17}}}, @pktinfo={{0x24, 0x29, 0x32, {@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, @tclass={{0x14, 0x29, 0x43, 0x87}}, @hoplimit={{0x14, 0x29, 0x34, 0x5}}, @tclass={{0x14, 0x29, 0x43, 0xffffffff}}, @hopopts={{0x100, 0x29, 0x36, {0x3c, 0x1c, '\x00', [@calipso={0x7, 0x30, {0x0, 0xa, 0xff, 0x5, [0x34, 0x0, 0x3b8300000, 0x0, 0x5a8]}}, @calipso={0x7, 0x10, {0x1, 0x2, 0xe9, 0x5, [0x6]}}, @padn={0x1, 0x1, [0x0]}, @jumbo={0xc2, 0x4, 0x6}, @calipso={0x7, 0x10, {0x1, 0x2, 0xb0, 0x3, [0x0]}}, @hao={0xc9, 0x10, @private2}, @generic={0x2, 0x69, "7d5cbc62d7659e65ac6d96e966b731fc8581aee2c32d1c278b1ecb8ebaa1d47652835cbdf4b2336a6874ca1bbccc27502eb3b5cbd0429892a19df518ab804390c28a5ad51599a5d8c2403b5cb45ba22fc1da06f4e27a4c6b656886983f42fc24bbaa37880f143a5752"}, @generic={0x0, 0x8, "7f5626e46816f214"}]}}}], 0x1f0}}, {{&(0x7f0000001b80)={0xa, 0x4e20, 0x101, @private2, 0x3}, 0x1c, &(0x7f0000001d00)=[{&(0x7f0000001bc0)="95a8be1069fbf737992569fe5682a9e3bd6cd3", 0x13}, {&(0x7f0000001c00)="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", 0xfd}], 0x2, &(0x7f0000001d40)=[@hopopts_2292={{0x18, 0x29, 0x36, {0x11}}}, @hoplimit={{0x14, 0x29, 0x34, 0xd9a3}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x5}}, @dstopts_2292={{0xb0, 0x29, 0x4, {0x1, 0x12, '\x00', [@hao={0xc9, 0x10, @remote}, @calipso={0x7, 0x20, {0x2, 0x6, 0xb8, 0x9, [0xc00000000000, 0x0, 0x5]}}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @calipso={0x7, 0x20, {0x3, 0x6, 0xa0, 0x3ff, [0x2, 0x9, 0x101]}}, @calipso={0x7, 0x28, {0x2, 0x8, 0x6, 0x7ff, [0x5, 0x5, 0x8, 0x6]}}, @enc_lim={0x4, 0x1, 0x20}, @pad1, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}}}, @tclass={{0x14, 0x29, 0x43, 0x1000}}, @hopopts_2292={{0x30, 0x29, 0x36, {0x32, 0x3, '\x00', [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @empty}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x4}}, @flowinfo={{0x14, 0x29, 0xb, 0x1}}], 0x170}}, {{&(0x7f0000002000)={0xa, 0x4e22, 0x1, @local, 0x4}, 0x1c, &(0x7f0000002700)=[{&(0x7f0000002040)="d9bf9f9c83bd09fa683627b91bcb2f3773a9947f515f79219655962898c9838d9a3178dfd50ed20fbaef7d6a378aa67ac4b481c2b4aa727cb258ce55d41b8a15d06e8f52a69ccb8fb0d87964c69f5986c053f6f07f994f603f3777eb7c371375cda4bab118c6a85e53dc41e86a28a74172dfc5e3354bb4e38af6c507347b3049f678242dc7ab9830d7df7fb4cfd427cfdfc162269efb404ecc758fe6e55d3b0a7a1e66964abf421a91f0282c8f5f899c9e6110c3a191f147bdf934870c7285a5eed3accbc6542a5ea384c1cc46d8a485113da4ef1cc9396a1f819b25cb2f65893e7b13fa", 0xe4}, {&(0x7f0000002140)="2ca53e6e241f10a8dc9205e8d2055dc32d4224a7357cf850c60ceb3e13e1", 0x1e}, {&(0x7f0000002180)="2da138a8ae68a3c8f5ef7c6ef9b246301034e523403e71234efd5f0bb21555456540af9ea5d2e66a", 0x28}, {&(0x7f00000021c0)="08958eff2fd756fa7f631399051e7d916d95b38d843cbca1ec740e2643403bbb207be8451ec8214154da534d9545834224d6c738c24d66ffa1e5e4d8d8c495268595f5ccf492f63542b1ee1643047fbb1863bc827d359506285d7c9c46fb5346801ae807c49aed69a0864b9d5cdb818bfda1062d5b1c", 0x76}, {&(0x7f0000002240)="be67387394ed31e832b0cb7ab75405241214ba6f8a4e7c8b17b9a815ec6d0a494ddb943f8268d14d79b59c2a49fee14d1532fa0663af88213f0e2ecfd6d15952b032cfc3d2e52aea0fc8ed1122dddb069529c342fbe8947534502bbcb6ff59309969d62327ad6d2ffac2b1a911ae984bd5f945deb3bde9be73489196a2a393557d7b36ac1c23e4979bea9c49a39f58b56a6c9a8aaaffc9ae50ba63731cbe4adc40197592894dbea912d8dd8df6ee1725961ff20003e0d83ede85e3ad54efda5c20098bc03eda02948350e9ce17e48e976b6872730a3c74fc93680586e410606dcc5769dbf885", 0xe6}, {&(0x7f0000002340)="d63834d504ebda43e7926cb48ba6ec1de677b89d14513040dfd15db0d1710a96f1666d9394ec971dd2dd05174f9f4aaedb0e1f56f83d704cba552d4e4f31b1d7cc9d330bb2753fc47e248ab7a79598f912e67309c9b3b1213d01dac8c5d6271d7f5cfb4465b73fafec3c49e1397b74a951e37f014b096a651ec562a40cac35072597e9b5ea8765a31f0fc4f6d47833832420542dd37adf247a7f571c58ac0687acb3b1173ec95e85e3057427301de881b916428811c477c612482d9093d2ce0c13e8", 0xc2}, {&(0x7f0000002440)="f3c6d590e0827ec8619f3f82000b2e2e97c68d3ae7e8ef804ed2f124b6f4e23a131a9b912cdabe9ee5b5aad9954e0fc682346952d2e26781450a8a9397dcddde8fc380665c875989f2d623505a75f076f060e96a2bd2a86fac22d463043fd9de682b848d7417e0f2f648d1cfb3b4d39236d17cf6aba19b3ed534407bd0a1158b3aee5f63fd5aac0a67946e5a49d2c912dbd2bc61c520defe27b08000d78061736939fcbf99dd5c53c3772d4adb78fc5e4c76a6e75fd1371321ae2474cb9ad3076f1b7f20", 0xc4}, {&(0x7f0000002540)="2098c4efb03b8356c034d540375f912dc822f2e91f4e6a530e2090111e80e206a57aeb14b67c898371907a9154a7d85a521a2cb06fca391f631759a08a5544152408061e37cf9ea5f1f48d2fabb4082febf75b61f02b11bac77a6dc0d3199ba5d93ec21a83ba599776909096d13e49fda236809f462239ee687ceca104dc7de2312f95c5ed06b39b27bbd0ddf6f8e6d5173304ae01dd5064089c877fdb6a2eb281ae8aa7b811592fb33b89350f4db3f1", 0xb0}, {&(0x7f0000002600)="98bb9eca98622aa13aee69b5de0f3a699d4502b4b175f90746c83ef6dfed7a2a6ba78e1fd7b4ed1eba4ece7aab85ea4596f8b87495b2a4a919ce1c49afce5e5a6894b76e0de9f5694984ed7721d65ed08a339322931077bcd5d54ddc9fe1d270908ce34636cb00f95465c11638c3611b04cf93583306c042cd", 0x79}, {&(0x7f0000002680)="a8ddcc976b70b1c0ee3ab03f66cd9e8911d5c6c37e93eecb8428ce7d7866ecf951c25a0f2cb62085892d5797ac3f70abdca81f7b7f824559e535a79ee83f2a35f351dfc56ece34d297", 0x49}], 0xa, &(0x7f00000027c0)=[@rthdr={{0x78, 0x29, 0x39, {0x3a, 0xc, 0x0, 0x5, 0x0, [@local, @empty, @ipv4={'\x00', '\xff\xff', @empty}, @mcast1, @loopback, @empty]}}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x3a, 0x6, 0x1, 0x4, 0x0, [@empty, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}]}}}, @tclass={{0x14, 0x29, 0x43, 0x214}}, @flowinfo={{0x14, 0x29, 0xb, 0xadf}}], 0xf0}}], 0x5, 0x4040015) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000002000000000000000200000d00d8fa9c7bcd7270f3586d42d7c7e1cdf9000000000000000000000001000000020000000000ea74d770a72cc1"], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1123.127875][ T6843] BPF:[1] FUNC_PROTO (anon) [ 1123.133846][ T6843] BPF:return=0 args=( [ 1123.137842][ T6843] BPF:0 [ 1123.140695][ T6843] BPF:, vararg [ 1123.145425][ T6843] BPF:) [ 1123.148199][ T6843] BPF: [ 1123.150967][ T6843] BPF:Invalid arg#2 [ 1123.154867][ T6843] BPF: [ 1123.154867][ T6843] [ 1123.166536][ T6845] BPF:[1] FUNC_PROTO (anon) [ 1123.172390][ T6845] BPF:return=0 args=( [ 1123.176378][ T6845] BPF:0 [ 1123.179227][ T6845] BPF:, vararg [ 1123.183848][ T6845] BPF:) [ 1123.186615][ T6845] BPF: [ 1123.189379][ T6845] BPF:Invalid arg#2 [ 1123.194460][ T6845] BPF: [ 1123.194460][ T6845] 01:13:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x403, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1123.218664][ T6848] BPF:[1] FUNC_PROTO (anon) [ 1123.225774][ T6848] BPF:return=0 args=( [ 1123.229819][ T6848] BPF:0 (invalid-name-offset) [ 1123.236422][ T6848] BPF:, 0 [ 1123.239461][ T6848] BPF:, vararg [ 1123.244129][ T6848] BPF:) [ 1123.246898][ T6848] BPF: [ 1123.249663][ T6848] BPF:Invalid arg#1 [ 1123.253594][ T6848] BPF: [ 1123.253594][ T6848] 01:13:20 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0xd2000000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1123.308077][ T6850] BPF:[1] FUNC_PROTO (anon) [ 1123.314192][ T6850] BPF:return=2633684992 args=( [ 1123.318977][ T6850] BPF:1114462451 (invalid-name-offset) [ 1123.325783][ T6850] BPF:, 249 (invalid-name-offset) [ 1123.330825][ T6850] BPF:) [ 1123.334914][ T6850] BPF: [ 1123.337694][ T6850] BPF:Invalid return type [ 1123.343179][ T6850] BPF: [ 1123.343179][ T6850] 01:13:20 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x74}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1123.378127][ T6852] BPF:[1] FUNC_PROTO (anon) [ 1123.384151][ T6852] BPF:return=2633684992 args=( [ 1123.388969][ T6852] BPF:1114462451 (invalid-name-offset) [ 1123.394497][ T6852] BPF:, 249 (invalid-name-offset) [ 1123.399522][ T6852] BPF:) [ 1123.402326][ T6852] BPF: [ 1123.405093][ T6852] BPF:Invalid return type [ 1123.409420][ T6852] BPF: [ 1123.409420][ T6852] [ 1123.530162][ T6863] device vlan1327 entered promiscuous mode [ 1123.544918][ T6864] BPF:[1] FUNC_PROTO (anon) [ 1123.549591][ T6864] BPF:return=0 args=( [ 1123.556147][ T6864] BPF:116 (anon) [ 1123.559712][ T6864] BPF:, 0 [ 1123.563698][ T6864] BPF:, vararg [ 1123.567091][ T6864] BPF:) [ 1123.569903][ T6864] BPF: [ 1123.573645][ T6864] BPF:Invalid arg#1 [ 1123.577455][ T6864] BPF: [ 1123.577455][ T6864] [ 1123.600394][ T6870] BPF:[1] FUNC_PROTO (anon) [ 1123.607354][ T6870] BPF:return=0 args=( [ 1123.612682][ T6870] BPF:116 (anon) [ 1123.616230][ T6870] BPF:, 0 [ 1123.619353][ T6870] BPF:, vararg [ 1123.623610][ T6870] BPF:) [ 1123.626378][ T6870] BPF: 01:13:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x26000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1123.629135][ T6870] BPF:Invalid arg#1 [ 1123.637622][ T6870] BPF: [ 1123.637622][ T6870] [ 1123.666263][ T6872] BPF:[1] FUNC_PROTO (anon) [ 1123.670928][ T6872] BPF:return=0 args=( [ 1123.676111][ T6872] BPF:0 [ 1123.678974][ T6872] BPF:, vararg [ 1123.683608][ T6872] BPF:) [ 1123.686380][ T6872] BPF: [ 1123.689147][ T6872] BPF:Invalid arg#2 [ 1123.694273][ T6872] BPF: [ 1123.694273][ T6872] [ 1123.704398][ T6873] BPF:[1] FUNC_PROTO (anon) [ 1123.709032][ T6873] BPF:return=0 args=( [ 1123.714465][ T6873] BPF:0 [ 1123.717324][ T6873] BPF:, vararg [ 1123.720706][ T6873] BPF:) [ 1123.724902][ T6873] BPF: 01:13:21 executing program 3: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1123.727672][ T6873] BPF:Invalid arg#2 [ 1123.732643][ T6873] BPF: [ 1123.732643][ T6873] 01:13:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x500, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:21 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x7a}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1123.802966][ T6876] BPF:[1] FUNC_PROTO (anon) [ 1123.807709][ T6876] BPF:return=0 args=( [ 1123.813122][ T6876] BPF:0 (invalid-name-offset) [ 1123.817810][ T6876] BPF:, 0 [ 1123.820830][ T6876] BPF:, vararg [ 1123.825206][ T6876] BPF:) [ 1123.827993][ T6876] BPF: [ 1123.830771][ T6876] BPF:Invalid arg#1 [ 1123.835613][ T6876] BPF: [ 1123.835613][ T6876] 01:13:21 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0xffff0f00}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1123.974887][ T6879] BPF:Invalid magic 01:13:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x26000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1124.030623][ T6886] BPF:[1] FUNC_PROTO (anon) [ 1124.036532][ T6886] BPF:return=0 args=( [ 1124.040532][ T6886] BPF:122 (anon) [ 1124.045688][ T6886] BPF:, 0 [ 1124.048723][ T6886] BPF:, vararg [ 1124.053561][ T6886] BPF:) [ 1124.056344][ T6886] BPF: [ 1124.059107][ T6886] BPF:Invalid arg#1 [ 1124.064313][ T6886] BPF: [ 1124.064313][ T6886] [ 1124.103016][ T6889] BPF:[1] FUNC_PROTO (anon) [ 1124.107677][ T6889] BPF:return=0 args=( [ 1124.113198][ T6889] BPF:122 (anon) [ 1124.116753][ T6889] BPF:, 0 [ 1124.119961][ T6889] BPF:, vararg [ 1124.123407][ T6889] BPF:) [ 1124.126172][ T6889] BPF: [ 1124.128940][ T6889] BPF:Invalid arg#1 [ 1124.129826][ T6895] BPF:[1] FUNC_PROTO (anon) [ 1124.132827][ T6889] BPF: [ 1124.132827][ T6889] [ 1124.145977][ T6895] BPF:return=0 args=( [ 1124.149963][ T6895] BPF:0 [ 1124.154064][ T6895] BPF:, vararg [ 1124.157441][ T6895] BPF:) [ 1124.160202][ T6895] BPF: [ 1124.164141][ T6895] BPF:Invalid arg#2 [ 1124.167954][ T6895] BPF: [ 1124.167954][ T6895] [ 1124.177497][ T6893] device vlan1328 entered promiscuous mode 01:13:21 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000002000000000000000200000dee3f0000000000b0b82ccfd0bfb604000200000000da6e00"], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001000)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000400)=""/36, 0x24}, {&(0x7f0000000440)=""/189, 0xbd}, {&(0x7f0000000500)=""/181, 0xb5}, {&(0x7f00000005c0)=""/21, 0x15}, {&(0x7f0000000600)=""/219, 0xdb}, {&(0x7f0000000700)=""/193, 0xc1}], 0x6, &(0x7f0000000880)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa0}}, {{&(0x7f0000000940)=@abs, 0x6e, &(0x7f0000000f00)=[{&(0x7f00000009c0)=""/236, 0xec}, {&(0x7f0000000ac0)=""/214, 0xd6}, {&(0x7f0000000bc0)=""/112, 0x70}, {&(0x7f0000000c40)=""/183, 0xb7}, {&(0x7f0000000d00)=""/144, 0x90}, {&(0x7f0000000dc0)=""/97, 0x61}, {&(0x7f0000000e40)=""/159, 0x9f}], 0x7, &(0x7f0000000f80)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60}}], 0x2, 0x10020, &(0x7f0000001080)={0x77359400}) ptrace$setregs(0xf, r1, 0x3ff, &(0x7f00000010c0)="c6cf15d073d0dde085e7b94e7f09eb29e7d493fed666e804c85cadc1a2518122119ba90ba5fc7a9851ce290ff5ba12b3323c583c4ea53f3a47ffefc02501383f92ee001fb2abf5500622c93d9b6902a3628d46a25f4bf4") r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$cont(0x18, r2, 0x8, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xc, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1a68f4e5}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}, @map={0x18, 0xb, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x7c}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x8b, &(0x7f0000000240)=""/139, 0xae68840319c130d0, 0x9, '\x00', 0x0, 0x8, r0, 0x8, &(0x7f0000000300)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x0, 0x1000, 0x5c}, 0x10, 0xffffffffffffffff}, 0x78) [ 1124.200342][ T6896] BPF:[1] FUNC_PROTO (anon) [ 1124.206300][ T6896] BPF:return=0 args=( [ 1124.210294][ T6896] BPF:0 [ 1124.214395][ T6896] BPF:, vararg [ 1124.217775][ T6896] BPF:) [ 1124.220538][ T6896] BPF: [ 1124.224590][ T6896] BPF:Invalid arg#2 [ 1124.228405][ T6896] BPF: [ 1124.228405][ T6896] 01:13:21 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0xd2}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x600, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1124.350174][ T6907] BPF:[1] FUNC_PROTO (anon) [ 1124.355876][ T6907] BPF:return=0 args=( [ 1124.360231][ T6907] BPF:0 (invalid-name-offset) [ 1124.366284][ T6907] BPF:, 0 [ 1124.369320][ T6907] BPF:, vararg [ 1124.372751][ T6907] BPF:) [ 1124.375515][ T6907] BPF: [ 1124.378281][ T6907] BPF:Invalid arg#1 [ 1124.382156][ T6907] BPF: [ 1124.382156][ T6907] [ 1124.386151][ T6909] BPF:Invalid string section 01:13:21 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0xffffff00}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1124.437725][ T6909] BPF:Invalid string section 01:13:22 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000000000200000d000000004721c39c0000000001000000020000000000"], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1124.583953][ T6918] device vlan1329 entered promiscuous mode [ 1124.593352][ T6922] BPF:[1] FUNC_PROTO (anon) [ 1124.598019][ T6922] BPF:return=0 args=( [ 1124.603240][ T6922] BPF:210 (anon) [ 1124.606802][ T6922] BPF:, 0 [ 1124.609829][ T6922] BPF:, vararg [ 1124.614577][ T6922] BPF:) [ 1124.617368][ T6922] BPF: [ 1124.620128][ T6922] BPF:Invalid arg#1 [ 1124.625210][ T6922] BPF: [ 1124.625210][ T6922] [ 1124.654069][ T6926] BPF:[1] FUNC_PROTO (anon) [ 1124.658730][ T6926] BPF:return=0 args=( [ 1124.664149][ T6926] BPF:210 (anon) [ 1124.667904][ T6926] BPF:, 0 [ 1124.670928][ T6926] BPF:, vararg [ 1124.676269][ T6926] BPF:) [ 1124.677124][ T6929] BPF:[1] FUNC_PROTO (anon) [ 1124.679036][ T6926] BPF: [ 1124.679048][ T6926] BPF:Invalid arg#1 [ 1124.679057][ T6926] BPF: [ 1124.679057][ T6926] [ 1124.698941][ T6929] BPF:return=0 args=( [ 1124.704076][ T6929] BPF:0 [ 1124.706942][ T6929] BPF:, vararg [ 1124.710314][ T6929] BPF:) [ 1124.714471][ T6929] BPF: [ 1124.717258][ T6929] BPF:Invalid arg#2 [ 1124.722270][ T6929] BPF: [ 1124.722270][ T6929] [ 1124.735789][ T6930] BPF:[1] FUNC_PROTO (anon) [ 1124.740452][ T6930] BPF:return=0 args=( [ 1124.746730][ T6930] BPF:0 [ 1124.749587][ T6930] BPF:, vararg 01:13:22 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x26000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1124.754303][ T6930] BPF:) [ 1124.757068][ T6930] BPF: [ 1124.759834][ T6930] BPF:Invalid arg#2 [ 1124.764973][ T6930] BPF: [ 1124.764973][ T6930] 01:13:22 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x300}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x700, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1124.923202][ T6936] BPF:Total section length too long [ 1124.934605][ T6937] BPF:Total section length too long 01:13:22 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xa, 0x5}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:22 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1124.980655][ T6938] BPF:[1] FUNC_PROTO (anon) [ 1124.987468][ T6938] BPF:return=0 args=( [ 1124.992738][ T6938] BPF:0 (invalid-name-offset) [ 1124.997431][ T6938] BPF:, 0 [ 1125.000458][ T6938] BPF:, vararg [ 1125.005136][ T6938] BPF:) [ 1125.007910][ T6938] BPF: [ 1125.010674][ T6938] BPF:Invalid arg#1 [ 1125.015734][ T6938] BPF: [ 1125.015734][ T6938] [ 1125.069028][ T6945] BPF:[1] FUNC_PROTO (anon) [ 1125.075261][ T6945] BPF:return=0 args=( [ 1125.076154][ T6946] BPF:[1] FUNC_PROTO (anon) [ 1125.079256][ T6945] BPF:768 (anon) [ 1125.079270][ T6945] BPF:, 0 [ 1125.079280][ T6945] BPF:, vararg [ 1125.079290][ T6945] BPF:) [ 1125.079299][ T6945] BPF: [ 1125.090235][ T6946] BPF:return=0 args=( [ 1125.090514][ T6945] BPF:Invalid arg#1 [ 1125.093907][ T6946] BPF:768 (anon) [ 1125.093921][ T6946] BPF:, 0 [ 1125.096660][ T6945] BPF: [ 1125.096660][ T6945] [ 1125.099401][ T6946] BPF:, vararg [ 1125.099412][ T6946] BPF:) [ 1125.129296][ T6946] BPF: [ 1125.133265][ T6946] BPF:Invalid arg#1 [ 1125.137079][ T6946] BPF: [ 1125.137079][ T6946] 01:13:22 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x26000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1125.263861][ T6958] BPF:[1] FUNC_PROTO (anon) [ 1125.268544][ T6958] BPF:return=0 args=( [ 1125.274892][ T6958] BPF:5 (invalid-name-offset) [ 1125.279907][ T6958] BPF:, 2 [ 1125.284330][ T6958] BPF:) [ 1125.287111][ T6958] BPF: [ 1125.289879][ T6958] BPF:Invalid arg#1 [ 1125.293741][ T6958] BPF: [ 1125.293741][ T6958] [ 1125.349869][ T6961] device vlan1330 entered promiscuous mode [ 1125.350070][ T6966] BPF:[1] FUNC_PROTO (anon) [ 1125.362990][ T6966] BPF:return=0 args=( [ 1125.366979][ T6966] BPF:0 [ 1125.369838][ T6966] BPF:, vararg [ 1125.370183][ T6967] BPF:[1] FUNC_PROTO (anon) [ 1125.373264][ T6966] BPF:) [ 1125.373275][ T6966] BPF: [ 1125.373284][ T6966] BPF:Invalid arg#1 [ 1125.373294][ T6966] BPF: [ 1125.373294][ T6966] [ 1125.396026][ T6967] BPF:return=0 args=( 01:13:22 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x500}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1125.400020][ T6967] BPF:0 [ 1125.402940][ T6967] BPF:, vararg [ 1125.406312][ T6967] BPF:) [ 1125.409082][ T6967] BPF: [ 1125.411904][ T6967] BPF:Invalid arg#1 [ 1125.415708][ T6967] BPF: [ 1125.415708][ T6967] 01:13:22 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:23 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1125.529477][ T6976] BPF:[1] FUNC_PROTO (anon) [ 1125.536718][ T6976] BPF:return=0 args=( [ 1125.540720][ T6976] BPF:0 (invalid-name-offset) [ 1125.545477][ T6976] BPF:, 0 [ 1125.548517][ T6976] BPF:, vararg [ 1125.551935][ T6976] BPF:) [ 1125.554712][ T6976] BPF: [ 1125.557486][ T6976] BPF:Invalid arg#1 [ 1125.561332][ T6976] BPF: [ 1125.561332][ T6976] [ 1125.606341][ T6979] BPF:[1] FUNC_PROTO (anon) [ 1125.612076][ T6979] BPF:return=0 args=( [ 1125.616085][ T6979] BPF:1280 (anon) [ 1125.619721][ T6979] BPF:, 0 [ 1125.624082][ T6979] BPF:, vararg [ 1125.627472][ T6979] BPF:) [ 1125.630238][ T6979] BPF: [ 1125.634263][ T6979] BPF:Invalid arg#1 [ 1125.638083][ T6979] BPF: [ 1125.638083][ T6979] 01:13:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x900, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1125.653233][ T6981] BPF:[1] FUNC_PROTO (anon) [ 1125.657877][ T6981] BPF:return=0 args=( [ 1125.662838][ T6981] BPF:1280 (anon) [ 1125.666485][ T6981] BPF:, 0 [ 1125.669511][ T6981] BPF:, vararg [ 1125.674162][ T6981] BPF:) [ 1125.676934][ T6981] BPF: [ 1125.679700][ T6981] BPF:Invalid arg#1 [ 1125.683579][ T6981] BPF: [ 1125.683579][ T6981] [ 1125.693441][ T6983] BPF:[1] FUNC_PROTO (anon) [ 1125.698102][ T6983] BPF:return=0 args=( [ 1125.703295][ T6983] BPF:0 [ 1125.706154][ T6983] BPF:, 2 (anon) [ 1125.709698][ T6983] BPF:) [ 1125.712512][ T6983] BPF: [ 1125.715281][ T6983] BPF:Invalid arg#1 [ 1125.719089][ T6983] BPF: [ 1125.719089][ T6983] [ 1125.733172][ T6990] BPF:[1] FUNC_PROTO (anon) [ 1125.737844][ T6990] BPF:return=0 args=( [ 1125.743105][ T6990] BPF:0 (anon) [ 1125.746483][ T6987] BPF:[1] FUNC_PROTO (anon) [ 1125.746488][ T6990] BPF:, 2 [ 1125.746501][ T6990] BPF:) [ 1125.752393][ T6987] BPF:return=0 args=( [ 1125.752407][ T6987] BPF:0 [ 1125.752417][ T6987] BPF:, 2 (anon) [ 1125.752426][ T6987] BPF:) [ 1125.752434][ T6987] BPF: [ 1125.752443][ T6987] BPF:Invalid arg#1 [ 1125.752452][ T6987] BPF: [ 1125.752452][ T6987] [ 1125.786763][ T6990] BPF: [ 1125.789540][ T6990] BPF:Invalid arg#1 [ 1125.794898][ T6990] BPF: [ 1125.794898][ T6990] [ 1125.834349][ T6991] BPF:[1] FUNC_PROTO (anon) [ 1125.839047][ T6991] BPF:return=0 args=( [ 1125.844384][ T6991] BPF:0 (anon) [ 1125.847772][ T6991] BPF:, 2 [ 1125.850792][ T6991] BPF:) [ 1125.854941][ T6991] BPF: [ 1125.857715][ T6991] BPF:Invalid arg#1 [ 1125.862793][ T6991] BPF: [ 1125.862793][ T6991] 01:13:23 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x3}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:23 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x26000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:23 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x600}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1125.914186][ T6997] device vlan1331 entered promiscuous mode 01:13:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0xa00, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1126.143809][ T7010] BPF:[1] FUNC_PROTO (anon) [ 1126.148467][ T7010] BPF:return=0 args=( [ 1126.153617][ T7010] BPF:0 [ 1126.156477][ T7010] BPF:, 3 (anon) [ 1126.160029][ T7010] BPF:) [ 1126.163918][ T7010] BPF: [ 1126.166694][ T7010] BPF:Invalid arg#1 [ 1126.167564][ T7013] BPF:[1] FUNC_PROTO (anon) [ 1126.170527][ T7010] BPF: [ 1126.170527][ T7010] [ 1126.182453][ T7013] BPF:return=0 args=( [ 1126.186450][ T7013] BPF:1536 (anon) [ 1126.190084][ T7013] BPF:, 0 [ 1126.194816][ T7013] BPF:, vararg [ 1126.198201][ T7013] BPF:) [ 1126.202446][ T7013] BPF: [ 1126.205222][ T7013] BPF:Invalid arg#1 [ 1126.209030][ T7013] BPF: [ 1126.209030][ T7013] [ 1126.240057][ T7015] BPF:[1] FUNC_PROTO (anon) [ 1126.246106][ T7015] BPF:return=0 args=( [ 1126.250101][ T7015] BPF:1536 (anon) [ 1126.254901][ T7015] BPF:, 0 [ 1126.257937][ T7015] BPF:, vararg [ 1126.262483][ T7015] BPF:) [ 1126.265253][ T7015] BPF: [ 1126.268028][ T7015] BPF:Invalid arg#1 [ 1126.272974][ T7015] BPF: [ 1126.272974][ T7015] [ 1126.292357][ T7018] BPF:[1] FUNC_PROTO (anon) [ 1126.296971][ T7018] BPF:return=0 args=( [ 1126.302269][ T7018] BPF:0 (invalid-name-offset) [ 1126.307153][ T7018] BPF:, 0 [ 1126.310182][ T7018] BPF:, vararg [ 1126.315097][ T7018] BPF:) [ 1126.317878][ T7018] BPF: [ 1126.320649][ T7018] BPF:Invalid arg#1 [ 1126.324526][ T7018] BPF: [ 1126.324526][ T7018] 01:13:23 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x4}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1126.503359][ T7027] BPF:[1] FUNC_PROTO (anon) [ 1126.508205][ T7027] BPF:return=0 args=( [ 1126.513649][ T7027] BPF:0 [ 1126.516509][ T7027] BPF:, 4 (anon) [ 1126.520067][ T7027] BPF:) [ 1126.522907][ T7027] BPF: [ 1126.525683][ T7027] BPF:Invalid arg#1 [ 1126.529491][ T7027] BPF: [ 1126.529491][ T7027] [ 1126.542469][ T7028] BPF:[1] FUNC_PROTO (anon) [ 1126.547081][ T7028] BPF:return=0 args=( 01:13:24 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x700}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1126.552311][ T7028] BPF:0 [ 1126.555166][ T7028] BPF:, 4 (anon) [ 1126.558707][ T7028] BPF:) [ 1126.562634][ T7028] BPF: [ 1126.565402][ T7028] BPF:Invalid arg#1 [ 1126.569201][ T7028] BPF: [ 1126.569201][ T7028] 01:13:24 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 01:13:24 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x5}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1126.625526][ T7031] device vlan1332 entered promiscuous mode 01:13:24 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1126.813498][ T7045] BPF:[1] FUNC_PROTO (anon) [ 1126.818329][ T7045] BPF:return=0 args=( [ 1126.823660][ T7045] BPF:0 [ 1126.826536][ T7045] BPF:, 5 (anon) [ 1126.830086][ T7045] BPF:) [ 1126.832934][ T7045] BPF: [ 1126.835699][ T7045] BPF:Invalid arg#1 [ 1126.839507][ T7045] BPF: [ 1126.839507][ T7045] [ 1126.880427][ T7048] BPF:[1] FUNC_PROTO (anon) [ 1126.886576][ T7048] BPF:return=0 args=( [ 1126.887831][ T7047] BPF:[1] FUNC_PROTO (anon) [ 1126.890589][ T7048] BPF:1792 (anon) [ 1126.896435][ T7047] BPF:return=0 args=( [ 1126.896450][ T7047] BPF:0 [ 1126.896460][ T7047] BPF:, 5 (anon) [ 1126.896469][ T7047] BPF:) [ 1126.896477][ T7047] BPF: [ 1126.896487][ T7047] BPF:Invalid arg#1 [ 1126.896496][ T7047] BPF: [ 1126.896496][ T7047] [ 1126.924900][ T7048] BPF:, 0 [ 1126.927936][ T7048] BPF:, vararg [ 1126.931362][ T7048] BPF:) [ 1126.934128][ T7048] BPF: [ 1126.936899][ T7048] BPF:Invalid arg#1 [ 1126.940717][ T7048] BPF: [ 1126.940717][ T7048] 01:13:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0xa02, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:24 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1126.974283][ T7050] BPF:[1] FUNC_PROTO (anon) [ 1126.978946][ T7050] BPF:return=0 args=( [ 1126.984433][ T7050] BPF:1792 (anon) [ 1126.988093][ T7050] BPF:, 0 [ 1126.991194][ T7050] BPF:, vararg [ 1126.994659][ T7050] BPF:) [ 1126.997424][ T7050] BPF: [ 1127.000192][ T7050] BPF:Invalid arg#1 [ 1127.004082][ T7050] BPF: [ 1127.004082][ T7050] 01:13:24 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x6}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:24 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000040)=""/211, 0x0, 0xd3, 0x8}, 0x20) [ 1127.197434][ T7061] device vlan1333 entered promiscuous mode [ 1127.273467][ T7072] BPF:[1] FUNC_PROTO (anon) [ 1127.278122][ T7072] BPF:return=0 args=( [ 1127.283555][ T7072] BPF:0 [ 1127.286424][ T7072] BPF:, 6 (anon) [ 1127.289973][ T7072] BPF:) [ 1127.294029][ T7072] BPF: [ 1127.296809][ T7072] BPF:Invalid arg#1 [ 1127.300619][ T7072] BPF: [ 1127.300619][ T7072] [ 1127.310478][ T7074] BPF:[1] FUNC_PROTO (anon) [ 1127.317574][ T7074] BPF:return=0 args=( 01:13:24 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0xa00}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1127.322868][ T7074] BPF:0 [ 1127.325728][ T7074] BPF:, 6 (anon) [ 1127.329562][ T7074] BPF:) [ 1127.333588][ T7074] BPF: [ 1127.336356][ T7074] BPF:Invalid arg#1 [ 1127.340156][ T7074] BPF: [ 1127.340156][ T7074] [ 1127.442146][ T7081] BPF:hdr_len not found [ 1127.478098][ T7083] BPF:[1] FUNC_PROTO (anon) [ 1127.484054][ T7083] BPF:return=0 args=( [ 1127.488082][ T7083] BPF:2560 (anon) [ 1127.493015][ T7083] BPF:, 0 [ 1127.496055][ T7083] BPF:, vararg [ 1127.499431][ T7083] BPF:) [ 1127.502266][ T7083] BPF: [ 1127.505033][ T7083] BPF:Invalid arg#1 [ 1127.508846][ T7083] BPF: [ 1127.508846][ T7083] [ 1127.522771][ T7084] BPF:[1] FUNC_PROTO (anon) 01:13:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0xc00, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:25 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x7}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:25 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$setregs(0xf, 0x0, 0x4dc4, &(0x7f0000000180)="35003075c5bb634f8166e8e0261c382651811d0a8ed0e18db3b7888e6d623084c0c28f8d78138db9d2163abcade5bd192e18e80c00e3727f13b2a4c7592997031fd69703050f414a18da42be6aabac8cfd6795dc9b58d71b3388e1c2d6f3a48d146780904ac4b7d18d2e2fa73723c70518bd00809d7abcd0d465190a2af4b6c24180b7b945cbd4a79e7af633f85fe79de3688e3953dadb58b927b78f5510ed2242644638799edb91a9928fca39f6ebc10b031eb26a8e5040024b35b6c773a443ea3b7f0dfcb1e0d87340cff8728a3fe8164052d5447f72dbe0cbac230165aa984d45bdcb") r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000340), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000004c0)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000500)={0x3c, r1, 0xdf591b2c9b17393d, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_DEVKEY={0x20, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_ID={0x10, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x4}]}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x3c}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)=0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x48, r1, 0x100, 0x70bd28, 0x25dfdbff, {}, [@NL802154_ATTR_PID={0x8, 0x1c, r4}, @NL802154_ATTR_PID={0x8, 0x1c, r5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}, @NL802154_ATTR_PID={0x8, 0x1c, 0xffffffffffffffff}, @NL802154_ATTR_NETNS_FD={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x48040) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000002000000000000000200000d00000000000007b11779e885121e0000020000000000"], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1127.527380][ T7084] BPF:return=0 args=( [ 1127.532690][ T7084] BPF:2560 (anon) [ 1127.536478][ T7084] BPF:, 0 [ 1127.539502][ T7084] BPF:, vararg [ 1127.542928][ T7084] BPF:) [ 1127.545693][ T7084] BPF: [ 1127.548475][ T7084] BPF:Invalid arg#1 [ 1127.552347][ T7084] BPF: [ 1127.552347][ T7084] 01:13:25 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x20) 01:13:25 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x1100}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1127.728943][ T7094] BPF:[1] FUNC_PROTO (anon) [ 1127.734681][ T7094] BPF:return=0 args=( [ 1127.739014][ T7094] BPF:2246605079 (invalid-name-offset) [ 1127.745911][ T7094] BPF:, 2 (invalid-name-offset) [ 1127.750835][ T7094] BPF:) [ 1127.753605][ T7094] BPF: [ 1127.756370][ T7094] BPF:Invalid arg#1 [ 1127.760264][ T7094] BPF: [ 1127.760264][ T7094] [ 1127.790280][ T7103] device vlan1334 entered promiscuous mode [ 1127.806313][ T7098] BPF:[1] FUNC_PROTO (anon) [ 1127.812083][ T7098] BPF:return=0 args=( [ 1127.816077][ T7098] BPF:2246605079 (invalid-name-offset) [ 1127.823075][ T7098] BPF:, 2 (invalid-name-offset) [ 1127.827929][ T7098] BPF:) [ 1127.830699][ T7098] BPF: [ 1127.833546][ T7098] BPF:Invalid arg#1 [ 1127.837356][ T7098] BPF: 01:13:25 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x20) [ 1127.837356][ T7098] [ 1127.850403][ T7101] BPF:[1] FUNC_PROTO (anon) [ 1127.856454][ T7101] BPF:return=0 args=( [ 1127.860452][ T7101] BPF:0 [ 1127.864583][ T7101] BPF:, 7 (anon) [ 1127.868136][ T7101] BPF:) [ 1127.872463][ T7101] BPF: [ 1127.875235][ T7101] BPF:Invalid arg#1 [ 1127.879040][ T7101] BPF: [ 1127.879040][ T7101] [ 1127.891919][ T7113] BPF:[1] FUNC_PROTO (anon) [ 1127.896529][ T7113] BPF:return=0 args=( [ 1127.900519][ T7113] BPF:0 [ 1127.905815][ T7113] BPF:, 7 (anon) [ 1127.909370][ T7113] BPF:) [ 1127.912174][ T7113] BPF: [ 1127.914936][ T7113] BPF:Invalid arg#1 [ 1127.918737][ T7113] BPF: [ 1127.918737][ T7113] [ 1127.984170][ T7117] BPF:[1] FUNC_PROTO (anon) [ 1127.989189][ T7117] BPF:return=0 args=( [ 1127.994690][ T7117] BPF:4352 (anon) [ 1127.998334][ T7117] BPF:, 0 [ 1128.002872][ T7117] BPF:, vararg [ 1128.006251][ T7117] BPF:) [ 1128.009012][ T7117] BPF: [ 1128.012881][ T7117] BPF:Invalid arg#1 [ 1128.016690][ T7117] BPF: [ 1128.016690][ T7117] 01:13:25 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x20) [ 1128.035038][ T7118] BPF:[1] FUNC_PROTO (anon) [ 1128.039671][ T7118] BPF:return=0 args=( [ 1128.046068][ T7118] BPF:4352 (anon) [ 1128.049712][ T7118] BPF:, 0 [ 1128.052783][ T7118] BPF:, vararg [ 1128.057626][ T7118] BPF:) [ 1128.060406][ T7118] BPF: [ 1128.063229][ T7118] BPF:Invalid arg#1 [ 1128.067026][ T7118] BPF: [ 1128.067026][ T7118] 01:13:25 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x8}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0xe00, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:25 executing program 3: ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000180)={0x1}) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f00000001c0)={0x0, 0x15ab65c5, 0xfff}) 01:13:25 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x1f00}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:25 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000040)=""/211, 0x0, 0xd3}, 0x20) [ 1128.412878][ T7139] BPF:[1] FUNC_PROTO (anon) [ 1128.417461][ T7137] BPF:[1] FUNC_PROTO (anon) [ 1128.417537][ T7139] BPF:return=0 args=( [ 1128.422122][ T7137] BPF:return=0 args=( [ 1128.422137][ T7137] BPF:0 (anon) [ 1128.422149][ T7137] BPF:, 2 [ 1128.422158][ T7137] BPF:) [ 1128.422167][ T7137] BPF: [ 1128.422177][ T7137] BPF:Invalid arg#1 [ 1128.422186][ T7137] BPF: [ 1128.422186][ T7137] [ 1128.455084][ T7145] BPF:[1] FUNC_PROTO (anon) [ 1128.459866][ T7139] BPF:0 [ 1128.459880][ T7139] BPF:, 8 (anon) [ 1128.459889][ T7139] BPF:) [ 1128.459898][ T7139] BPF: [ 1128.459908][ T7139] BPF:Invalid arg#1 [ 1128.467071][ T7145] BPF:return=0 args=( [ 1128.468682][ T7139] BPF: [ 1128.468682][ T7139] [ 1128.472314][ T7145] BPF:0 (anon) [ 1128.497055][ T7145] BPF:, 2 [ 1128.500082][ T7145] BPF:) [ 1128.503900][ T7145] BPF: [ 1128.504686][ T7140] BPF:[1] FUNC_PROTO (anon) [ 1128.506665][ T7145] BPF:Invalid arg#1 [ 1128.506677][ T7145] BPF: [ 1128.506677][ T7145] [ 1128.522619][ T7140] BPF:return=0 args=( [ 1128.526601][ T7140] BPF:0 [ 1128.529449][ T7140] BPF:, 8 (anon) [ 1128.534172][ T7140] BPF:) [ 1128.536976][ T7140] BPF: [ 1128.539737][ T7140] BPF:Invalid arg#1 [ 1128.544762][ T7140] BPF: [ 1128.544762][ T7140] [ 1128.547949][ T7150] BPF:[1] FUNC_PROTO (anon) [ 1128.557083][ T7150] BPF:return=0 args=( [ 1128.561115][ T7150] BPF:7936 (anon) [ 1128.564756][ T7150] BPF:, 0 [ 1128.567784][ T7150] BPF:, vararg [ 1128.571187][ T7150] BPF:) [ 1128.573777][ T7148] device vlan1335 entered promiscuous mode [ 1128.573948][ T7150] BPF: [ 1128.582535][ T7150] BPF:Invalid arg#1 [ 1128.586345][ T7150] BPF: [ 1128.586345][ T7150] 01:13:26 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000040)=""/211, 0x0, 0xd3}, 0x20) [ 1128.617925][ T7153] BPF:[1] FUNC_PROTO (anon) [ 1128.623799][ T7153] BPF:return=0 args=( [ 1128.627823][ T7153] BPF:7936 (anon) [ 1128.632591][ T7153] BPF:, 0 [ 1128.635616][ T7153] BPF:, vararg [ 1128.639074][ T7153] BPF:) [ 1128.642940][ T7153] BPF: [ 1128.645709][ T7153] BPF:Invalid arg#1 [ 1128.649513][ T7153] BPF: [ 1128.649513][ T7153] 01:13:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0xe16, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:26 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000040)=""/211, 0x0, 0xd3}, 0x20) 01:13:26 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x2000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:26 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0xa}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:26 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000002000000000000000200000d00"/54], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) r1 = syz_open_dev$vcsu(&(0x7f0000000280), 0x2, 0x8080) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r3, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f00000004c0)={0x6, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x1000802, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c6e0800000000000000b0d0f30bf65311ce3d002c63616368643d6d6d61702c64666c746769643d", @ANYRESHEX=0xee00, @ANYBLOB=',noextend,privport,fowner=', @ANYRESDEC=r4, @ANYBLOB=',\x00']) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000100)) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000500)={0xffffffff, 0xb1c, 0x9, 0x7fff, 0x3, [0x4, 0x20, 0x9, 0x40], [0xfffffffe, 0x7, 0x3, 0xfff], [0x1, 0xc63, 0x7, 0x5], [0x400, 0x3, 0x6, 0x2]}) ioctl$VIDIOC_S_EXT_CTRLS(r5, 0xc0205648, &(0x7f00000001c0)={0xa10000, 0x8, 0x5, r0, 0x0, &(0x7f0000000180)={0x9909c9, 0x3ff, '\x00', @value64=0xfffffffffffffffd}}) [ 1129.088529][ T7179] device vlan1336 entered promiscuous mode [ 1129.133516][ T7183] BPF:[1] FUNC_PROTO (anon) [ 1129.138173][ T7183] BPF:return=0 args=( [ 1129.143366][ T7183] BPF:8192 (anon) [ 1129.147011][ T7183] BPF:, 0 [ 1129.150038][ T7183] BPF:, vararg [ 1129.154780][ T7183] BPF:) [ 1129.157556][ T7183] BPF: [ 1129.160328][ T7183] BPF:Invalid arg#1 [ 1129.165273][ T7183] BPF: [ 1129.165273][ T7183] 01:13:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x48000000, &(0x7f0000006200)={[{@gid={'gid', 0x3d, r1}}]}) [ 1129.182297][ T7184] BPF:[1] FUNC_PROTO (anon) [ 1129.186910][ T7184] BPF:return=0 args=( [ 1129.192288][ T7184] BPF:8192 (anon) [ 1129.195926][ T7184] BPF:, 0 [ 1129.198945][ T7184] BPF:, vararg [ 1129.203587][ T7184] BPF:) [ 1129.206368][ T7184] BPF: [ 1129.209128][ T7184] BPF:Invalid arg#1 [ 1129.214308][ T7184] BPF: [ 1129.214308][ T7184] [ 1129.244730][ T7187] BPF:[1] FUNC_PROTO (anon) [ 1129.249422][ T7187] BPF:return=0 args=( [ 1129.254902][ T7187] BPF:0 [ 1129.257768][ T7187] BPF:, 10 (anon) [ 1129.261467][ T7187] BPF:) [ 1129.264239][ T7187] BPF: [ 1129.267874][ T7187] BPF:Invalid arg#1 [ 1129.271844][ T7187] BPF: [ 1129.271844][ T7187] [ 1129.301095][ T7191] BPF:[1] FUNC_PROTO (anon) [ 1129.305740][ T7191] BPF:return=0 args=( [ 1129.309730][ T7191] BPF:0 (anon) [ 1129.310361][ T7188] BPF:[1] FUNC_PROTO (anon) [ 1129.316326][ T7191] BPF:, vararg [ 1129.318916][ T7188] BPF:return=0 args=( [ 1129.322305][ T7191] BPF:) [ 1129.322317][ T7191] BPF: [ 1129.322328][ T7191] BPF:Invalid arg#1 [ 1129.322337][ T7191] BPF: [ 1129.322337][ T7191] [ 1129.342960][ T7188] BPF:0 [ 1129.345812][ T7188] BPF:, 10 (anon) [ 1129.349445][ T7188] BPF:) [ 1129.352276][ T7188] BPF: [ 1129.355035][ T7188] BPF:Invalid arg#1 [ 1129.358838][ T7188] BPF: [ 1129.358838][ T7188] [ 1129.387074][ T7192] BPF:[1] FUNC_PROTO (anon) [ 1129.393001][ T7192] BPF:return=0 args=( [ 1129.397033][ T7192] BPF:0 (anon) [ 1129.400407][ T7192] BPF:, vararg [ 1129.405124][ T7192] BPF:) [ 1129.407900][ T7192] BPF: [ 1129.410726][ T7192] BPF:Invalid arg#1 [ 1129.414532][ T7192] BPF: [ 1129.414532][ T7192] 01:13:27 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}, {0x3, 0x5}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x81, 0xfd, 0x81, 0x5, 0x3, 0x3e, 0x3, 0x296, 0x40, 0x36d, 0x3, 0x2, 0x38, 0x2, 0x3c, 0x6, 0x101}, [{0x70000000, 0x7f, 0x3, 0x7f, 0x40, 0x4, 0x4, 0x7}], "443bde6d918f7def341b08d78777ea838c3d45dca4e1daa59138de04921a7efa4ce62a74d2333d21becaf31d3a7b66a4d246544fe51d66612d2286", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xab3) 01:13:27 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x2400}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0xf00, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:27 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5, 0x0, 0x0}) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000600000018000000a46b12ecfcc8f780495d994e786f7d529646b824f27d1fbdcb3bdd8891d51b7752adc16d1165a7dcfaec9aa948abea1a931365f33736ce41c8d134a63b9b00000000000000", @ANYRES32=r3, @ANYBLOB="ffff8ae200005b002e2f66696c6530004040cd976d09e670516d510ad3e1e87e03af7f3156cc937ac91b95d401a519874fed66bfef23b19dabc7f6589342ce89574f38b3656e68c645bcaea00f4270dc17c11631547adda879521f3bc8d447480155a0529e9e7dbd5d543ba5c29dfd102a25e6a1bae3951264746cc6c90ca85ed5d4ae82f094687857fc5e3a1ed72cd7ca4154534626ff574519dd2af95758e22112c5019d36ff07000083f01ededbee118bdddbd599cb565dd423ae30a460018c11158fb9316700000000000000000000000000000000d1e5dc3dd64279ed722ac5462af1ca1d2f6ddc432338ec3006cb6aebad5074b6c11d297d43ef1e5568bc74c7b9311f1b439bd062a25919dd764b5cb631703a0326cb6e90255751fe9d6c08ffa6ec9e6e76f4507ed7a491242fe6aa317905de42599c1b2f79"]) r5 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x210082) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1001, 0x2008}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) dup2(0xffffffffffffffff, r3) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r5, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800, 0x2], [], [0x0, 0x20000000000]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f0000000600)=ANY=[@ANYBLOB="016508000026909c144f67d49a0f6d16684f7b71d95fa2bbaf0be959fcae3b66e6b69470f949288c7e178690ec6be1e0a89fe26a9e568155df8fa7ae363a2bc275dfd7258947cae8be4b3961cace6184c249c39e8538b44fab2f887540228dea59fc63692ba198662c80298d2e094310ad2b3c390ba2cd07e2f3e28584cd66eb05043ede177bfa7d662d7b15b373d49a4088708b3f6f35eed3cc657afa844b5d811888074b1960ea7eda23b21af68d9aba2a27520c9793d95a69356f325a3d8808652922e1fd5f7690686175a17be39d80db97777cecbd773f1ac5", @ANYRES32=r5, @ANYBLOB="acdfc427000000002e2f66696c6530005072cc351cfe11000400002ec11e3e14ab02d2f83b4433c447da4a6d337b0bd20696352aae27d7d3101876714bee5951426d7b453b2fa451d52dcc3f98ead8f45d4a2f4ae0b14f4bfdafb3ac5dd1833eeca6b44abaae164f301ace6d8ea311410d8ab4b00b57d88dfc94111c663a0942443771d60a223a6c885516ecab8ed24cc28a57349832d5f16de751a12adc6aca6c4c40185f010298b67bb0c8ecddf7376a5e89c8cdbbbbbbff318203e2317255d50f557bba03eefb0c5dbb"]) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0x0, 0xd7}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00464b4, &(0x7f0000000240)={r1}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000200)={0x2400, 0x0, 0x8}) 01:13:27 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x1c}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1129.721116][ T7202] BPF:[1] FUNC_PROTO (anon) [ 1129.725763][ T7202] BPF:return=0 args=( [ 1129.729752][ T7202] BPF:0 (anon) [ 1129.735547][ T7202] BPF:, 2 [ 1129.738595][ T7202] BPF:, 5 (invalid-name-offset) [ 1129.743506][ T7202] BPF:) [ 1129.746282][ T7202] BPF: [ 1129.749040][ T7202] BPF:Invalid arg#1 [ 1129.752911][ T7202] BPF: [ 1129.752911][ T7202] [ 1129.772267][ T7206] BPF:[1] FUNC_PROTO (anon) [ 1129.777573][ T7206] BPF:return=0 args=( [ 1129.784010][ T7206] BPF:9216 (anon) [ 1129.788048][ T7206] BPF:, 0 [ 1129.792537][ T7206] BPF:, vararg [ 1129.795922][ T7206] BPF:) [ 1129.798686][ T7206] BPF: [ 1129.801502][ T7206] BPF:Invalid arg#1 [ 1129.805309][ T7206] BPF: [ 1129.805309][ T7206] [ 1129.814986][ T7207] BPF:[1] FUNC_PROTO (anon) [ 1129.819589][ T7207] BPF:return=0 args=( [ 1129.824891][ T7207] BPF:0 (anon) [ 1129.828270][ T7207] BPF:, 2 [ 1129.832791][ T7207] BPF:, 5 (invalid-name-offset) [ 1129.837641][ T7207] BPF:) [ 1129.840403][ T7207] BPF: [ 1129.844477][ T7207] BPF:Invalid arg#1 [ 1129.848288][ T7207] BPF: [ 1129.848288][ T7207] [ 1129.870223][ T7217] BPF:[1] FUNC_PROTO (anon) [ 1129.872738][ T7211] BPF:[1] FUNC_PROTO (anon) [ 1129.876540][ T7217] BPF:return=0 args=( [ 1129.879420][ T7211] BPF:return=0 args=( [ 1129.879435][ T7211] BPF:9216 (anon) [ 1129.879446][ T7211] BPF:, 0 [ 1129.879454][ T7211] BPF:, vararg [ 1129.884700][ T7217] BPF:0 [ 1129.884714][ T7217] BPF:, 28 (anon) [ 1129.884724][ T7217] BPF:) [ 1129.884733][ T7217] BPF: [ 1129.884744][ T7217] BPF:Invalid arg#1 [ 1129.884753][ T7217] BPF: [ 1129.884753][ T7217] [ 1129.908206][ T7218] BPF:[1] FUNC_PROTO (anon) [ 1129.910428][ T7211] BPF:) [ 1129.910438][ T7211] BPF: [ 1129.910447][ T7211] BPF:Invalid arg#1 [ 1129.910456][ T7211] BPF: [ 1129.910456][ T7211] [ 1129.942456][ T7218] BPF:return=0 args=( [ 1129.946440][ T7218] BPF:0 [ 1129.949293][ T7218] BPF:, 28 (anon) [ 1129.952994][ T7218] BPF:) [ 1129.955757][ T7218] BPF: [ 1129.958520][ T7218] BPF:Invalid arg#1 [ 1129.962376][ T7218] BPF: [ 1129.962376][ T7218] 01:13:27 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5, 0x0, 0x0}) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000600000018000000a46b12ecfcc8f780495d994e786f7d529646b824f27d1fbdcb3bdd8891d51b7752adc16d1165a7dcfaec9aa948abea1a931365f33736ce41c8d134a63b9b00000000000000", @ANYRES32=r3, @ANYBLOB="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"]) r5 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x210082) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1001, 0x2008}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) dup2(0xffffffffffffffff, r3) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r5, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800, 0x2], [], [0x0, 0x20000000000]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f0000000600)=ANY=[@ANYBLOB="016508000026909c144f67d49a0f6d16684f7b71d95fa2bbaf0be959fcae3b66e6b69470f949288c7e178690ec6be1e0a89fe26a9e568155df8fa7ae363a2bc275dfd7258947cae8be4b3961cace6184c249c39e8538b44fab2f887540228dea59fc63692ba198662c80298d2e094310ad2b3c390ba2cd07e2f3e28584cd66eb05043ede177bfa7d662d7b15b373d49a4088708b3f6f35eed3cc657afa844b5d811888074b1960ea7eda23b21af68d9aba2a27520c9793d95a69356f325a3d8808652922e1fd5f7690686175a17be39d80db97777cecbd773f1ac5", @ANYRES32=r5, @ANYBLOB="acdfc427000000002e2f66696c6530005072cc351cfe11000400002ec11e3e14ab02d2f83b4433c447da4a6d337b0bd20696352aae27d7d3101876714bee5951426d7b453b2fa451d52dcc3f98ead8f45d4a2f4ae0b14f4bfdafb3ac5dd1833eeca6b44abaae164f301ace6d8ea311410d8ab4b00b57d88dfc94111c663a0942443771d60a223a6c885516ecab8ed24cc28a57349832d5f16de751a12adc6aca6c4c40185f010298b67bb0c8ecddf7376a5e89c8cdbbbbbbff318203e2317255d50f557bba03eefb0c5dbb"]) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0x0, 0xd7}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00464b4, &(0x7f0000000240)={r1}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000200)={0x2400, 0x0, 0x8}) 01:13:27 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x2600}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:27 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}, {0x10, 0x4}]}]}}, &(0x7f0000000180)=""/217, 0x3e, 0xd9, 0x8}, 0x20) [ 1129.983811][ T7210] device vlan1337 entered promiscuous mode 01:13:27 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x1e}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:27 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5, 0x0, 0x0}) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000600000018000000a46b12ecfcc8f780495d994e786f7d529646b824f27d1fbdcb3bdd8891d51b7752adc16d1165a7dcfaec9aa948abea1a931365f33736ce41c8d134a63b9b00000000000000", @ANYRES32=r3, @ANYBLOB="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"]) r5 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x210082) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1001, 0x2008}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) dup2(0xffffffffffffffff, r3) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r5, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800, 0x2], [], [0x0, 0x20000000000]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f0000000600)=ANY=[@ANYBLOB="016508000026909c144f67d49a0f6d16684f7b71d95fa2bbaf0be959fcae3b66e6b69470f949288c7e178690ec6be1e0a89fe26a9e568155df8fa7ae363a2bc275dfd7258947cae8be4b3961cace6184c249c39e8538b44fab2f887540228dea59fc63692ba198662c80298d2e094310ad2b3c390ba2cd07e2f3e28584cd66eb05043ede177bfa7d662d7b15b373d49a4088708b3f6f35eed3cc657afa844b5d811888074b1960ea7eda23b21af68d9aba2a27520c9793d95a69356f325a3d8808652922e1fd5f7690686175a17be39d80db97777cecbd773f1ac5", @ANYRES32=r5, @ANYBLOB="acdfc427000000002e2f66696c6530005072cc351cfe11000400002ec11e3e14ab02d2f83b4433c447da4a6d337b0bd20696352aae27d7d3101876714bee5951426d7b453b2fa451d52dcc3f98ead8f45d4a2f4ae0b14f4bfdafb3ac5dd1833eeca6b44abaae164f301ace6d8ea311410d8ab4b00b57d88dfc94111c663a0942443771d60a223a6c885516ecab8ed24cc28a57349832d5f16de751a12adc6aca6c4c40185f010298b67bb0c8ecddf7376a5e89c8cdbbbbbbff318203e2317255d50f557bba03eefb0c5dbb"]) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0x0, 0xd7}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00464b4, &(0x7f0000000240)={r1}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000200)={0x2400, 0x0, 0x8}) 01:13:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0xffe, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1130.182753][ T7237] BPF:[1] FUNC_PROTO (anon) [ 1130.187434][ T7237] BPF:return=0 args=( [ 1130.193911][ T7237] BPF:0 (anon) [ 1130.197303][ T7237] BPF:, 2 [ 1130.200338][ T7237] BPF:, 4 (invalid-name-offset) [ 1130.205240][ T7237] BPF:) [ 1130.208005][ T7237] BPF: [ 1130.210815][ T7237] BPF:Invalid arg#1 [ 1130.214623][ T7237] BPF: [ 1130.214623][ T7237] [ 1130.233696][ T7234] BPF:[1] FUNC_PROTO (anon) [ 1130.238326][ T7234] BPF:return=0 args=( [ 1130.243635][ T7234] BPF:9728 (anon) [ 1130.247291][ T7234] BPF:, 0 [ 1130.250321][ T7234] BPF:, vararg [ 1130.255085][ T7234] BPF:) [ 1130.257865][ T7234] BPF: [ 1130.260695][ T7234] BPF:Invalid arg#1 [ 1130.264511][ T7234] BPF: [ 1130.264511][ T7234] [ 1130.273448][ T7240] BPF:[1] FUNC_PROTO (anon) [ 1130.278089][ T7240] BPF:return=0 args=( [ 1130.283350][ T7240] BPF:0 [ 1130.286213][ T7240] BPF:, 30 (anon) [ 1130.289892][ T7240] BPF:) [ 1130.293878][ T7240] BPF: [ 1130.296852][ T7240] BPF:Invalid arg#1 [ 1130.302136][ T7240] BPF: [ 1130.302136][ T7240] 01:13:27 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x4800}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1130.329805][ T7238] BPF:[1] FUNC_PROTO (anon) [ 1130.335897][ T7238] BPF:return=0 args=( [ 1130.339920][ T7238] BPF:0 (anon) [ 1130.343369][ T7238] BPF:, 2 [ 1130.346402][ T7238] BPF:, 4 (invalid-name-offset) [ 1130.351301][ T7238] BPF:) [ 1130.354069][ T7238] BPF: [ 1130.356833][ T7238] BPF:Invalid arg#1 [ 1130.360685][ T7238] BPF: [ 1130.360685][ T7238] 01:13:27 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xb, [@ptr={0x9, 0x0, 0x0, 0x2, 0x2}, @union={0xc, 0x2, 0x0, 0x5, 0x1, 0x80000001, [{0x0, 0x5, 0x5}, {0xd, 0x1, 0x9}]}]}, {0x0, [0x0, 0x2e, 0x0, 0x61, 0x30, 0x5f, 0x0, 0x0, 0x61]}}, &(0x7f0000000040)=""/199, 0x53, 0xc7, 0x8}, 0x20) [ 1130.425649][ T7255] device vlan1338 entered promiscuous mode 01:13:28 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x2e}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x1200, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1130.611013][ T7262] BPF:[1] FUNC_PROTO (anon) [ 1130.615693][ T7262] BPF:return=0 args=( [ 1130.619687][ T7262] BPF:18432 (anon) [ 1130.625907][ T7262] BPF:, 0 [ 1130.628943][ T7262] BPF:, vararg [ 1130.633636][ T7262] BPF:) [ 1130.636408][ T7262] BPF: [ 1130.639181][ T7262] BPF:Invalid arg#1 [ 1130.644071][ T7262] BPF: [ 1130.644071][ T7262] [ 1130.684277][ T7263] BPF:[1] FUNC_PROTO (anon) [ 1130.688907][ T7263] BPF:return=0 args=( [ 1130.694020][ T7263] BPF:18432 (anon) [ 1130.697747][ T7263] BPF:, 0 [ 1130.702323][ T7263] BPF:, vararg [ 1130.705709][ T7263] BPF:) [ 1130.708484][ T7263] BPF: [ 1130.711286][ T7263] BPF:Invalid arg#1 [ 1130.715095][ T7263] BPF: [ 1130.715095][ T7263] [ 1130.733054][ T7267] BPF:[1] FUNC_PROTO (anon) [ 1130.737740][ T7267] BPF:return=0 args=( [ 1130.742980][ T7267] BPF:0 [ 1130.745850][ T7267] BPF:, 46 (anon) [ 1130.746658][ T7269] BPF:[1] PTR a [ 1130.749566][ T7267] BPF:) [ 1130.749579][ T7267] BPF: [ 1130.749589][ T7267] BPF:Invalid arg#1 [ 1130.749599][ T7267] BPF: [ 1130.749599][ T7267] [ 1130.765861][ T7268] BPF:[1] FUNC_PROTO (anon) [ 1130.769819][ T7269] BPF:type_id=2 [ 1130.769831][ T7269] BPF: [ 1130.769841][ T7269] BPF:Invalid name [ 1130.769851][ T7269] BPF: [ 1130.769851][ T7269] [ 1130.792942][ T7268] BPF:return=0 args=( [ 1130.793731][ T7270] BPF:[1] PTR a [ 1130.796938][ T7268] BPF:0 [ 1130.796950][ T7268] BPF:, 46 (anon) [ 1130.796959][ T7268] BPF:) [ 1130.796967][ T7268] BPF: [ 1130.796977][ T7268] BPF:Invalid arg#1 [ 1130.802910][ T7270] BPF:type_id=2 [ 1130.804749][ T7268] BPF: [ 1130.804749][ T7268] [ 1130.827531][ T7270] BPF: [ 1130.830288][ T7270] BPF:Invalid name 01:13:28 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x48}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1130.834046][ T7270] BPF: [ 1130.834046][ T7270] 01:13:28 executing program 3: ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(0xffffffffffffffff, 0x7a8, &(0x7f0000000180)={{@hyper, 0xffffffe5}, @any, 0x2, 0xffffffffffffffff, 0x9, 0x4, 0x2, 0x7, 0x7}) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x8, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x37}, @alu={0x7, 0x0, 0x8, 0x7, 0x7, 0xffffffffffffffc8, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x2}]}, &(0x7f0000000200)='syzkaller\x00', 0x6, 0xdd, &(0x7f00000004c0)=""/221, 0x40f00, 0x12, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0x4, 0x3, 0xc}, 0x10, 0xcd58}, 0x78) 01:13:28 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x4c00}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1131.015775][ T7285] BPF:[1] FUNC_PROTO (anon) [ 1131.020425][ T7285] BPF:return=0 args=( [ 1131.025623][ T7285] BPF:0 (anon) [ 1131.029011][ T7285] BPF:, 2 [ 1131.033193][ T7285] BPF:) [ 1131.035966][ T7285] BPF: [ 1131.038735][ T7285] BPF:Invalid arg#1 [ 1131.041896][ T7282] device vlan1339 entered promiscuous mode [ 1131.043797][ T7285] BPF: [ 1131.043797][ T7285] [ 1131.069314][ T7289] BPF:[1] FUNC_PROTO (anon) [ 1131.076847][ T7289] BPF:return=0 args=( [ 1131.082137][ T7289] BPF:0 (anon) [ 1131.085521][ T7289] BPF:, 2 [ 1131.088543][ T7289] BPF:) [ 1131.092503][ T7289] BPF: [ 1131.095273][ T7289] BPF:Invalid arg#1 [ 1131.099091][ T7289] BPF: [ 1131.099091][ T7289] [ 1131.125641][ T7291] BPF:[1] FUNC_PROTO (anon) [ 1131.130289][ T7291] BPF:return=0 args=( [ 1131.133304][ T7293] BPF:[1] FUNC_PROTO (anon) [ 1131.135627][ T7291] BPF:0 [ 1131.138926][ T7293] BPF:return=0 args=( [ 1131.141800][ T7291] BPF:, 72 (anon) [ 1131.141813][ T7291] BPF:) [ 1131.141822][ T7291] BPF: [ 1131.141832][ T7291] BPF:Invalid arg#1 [ 1131.141841][ T7291] BPF: [ 1131.141841][ T7291] [ 1131.166768][ T7293] BPF:19456 (anon) [ 1131.171700][ T7293] BPF:, 0 [ 1131.174440][ T7294] BPF:[1] FUNC_PROTO (anon) [ 1131.174726][ T7293] BPF:, vararg [ 1131.174738][ T7293] BPF:) [ 1131.174747][ T7293] BPF: [ 1131.174758][ T7293] BPF:Invalid arg#1 [ 1131.179331][ T7294] BPF:return=0 args=( [ 1131.183961][ T7293] BPF: [ 1131.183961][ T7293] [ 1131.205780][ T7296] BPF:[1] FUNC_PROTO (anon) [ 1131.205805][ T7296] BPF:return=0 args=( [ 1131.205817][ T7296] BPF:19456 (anon) [ 1131.205828][ T7296] BPF:, 0 [ 1131.205837][ T7296] BPF:, vararg 01:13:28 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5, 0x0, 0x0}) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000600000018000000a46b12ecfcc8f780495d994e786f7d529646b824f27d1fbdcb3bdd8891d51b7752adc16d1165a7dcfaec9aa948abea1a931365f33736ce41c8d134a63b9b00000000000000", @ANYRES32=r3, @ANYBLOB="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"]) r5 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x210082) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1001, 0x2008}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) dup2(0xffffffffffffffff, r3) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r5, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800, 0x2], [], [0x0, 0x20000000000]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f0000000600)=ANY=[@ANYBLOB="016508000026909c144f67d49a0f6d16684f7b71d95fa2bbaf0be959fcae3b66e6b69470f949288c7e178690ec6be1e0a89fe26a9e568155df8fa7ae363a2bc275dfd7258947cae8be4b3961cace6184c249c39e8538b44fab2f887540228dea59fc63692ba198662c80298d2e094310ad2b3c390ba2cd07e2f3e28584cd66eb05043ede177bfa7d662d7b15b373d49a4088708b3f6f35eed3cc657afa844b5d811888074b1960ea7eda23b21af68d9aba2a27520c9793d95a69356f325a3d8808652922e1fd5f7690686175a17be39d80db97777cecbd773f1ac5", @ANYRES32=r5, @ANYBLOB="acdfc427000000002e2f66696c6530005072cc351cfe11000400002ec11e3e14ab02d2f83b4433c447da4a6d337b0bd20696352aae27d7d3101876714bee5951426d7b453b2fa451d52dcc3f98ead8f45d4a2f4ae0b14f4bfdafb3ac5dd1833eeca6b44abaae164f301ace6d8ea311410d8ab4b00b57d88dfc94111c663a0942443771d60a223a6c885516ecab8ed24cc28a57349832d5f16de751a12adc6aca6c4c40185f010298b67bb0c8ecddf7376a5e89c8cdbbbbbbff318203e2317255d50f557bba03eefb0c5dbb"]) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x5, 0x0, 0xd7}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00464b4, &(0x7f0000000240)={r1}) [ 1131.205846][ T7296] BPF:) [ 1131.205854][ T7296] BPF: [ 1131.205863][ T7296] BPF:Invalid arg#1 [ 1131.205872][ T7296] BPF: [ 1131.205872][ T7296] [ 1131.238734][ T7294] BPF:0 [ 1131.241633][ T7294] BPF:, 72 (anon) [ 1131.245264][ T7294] BPF:) [ 1131.248021][ T7294] BPF: [ 1131.250825][ T7294] BPF:Invalid arg#1 [ 1131.254633][ T7294] BPF: [ 1131.254633][ T7294] 01:13:28 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x4c}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x1602, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:28 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0xffffffffffffffff, &(0x7f0000000180), 0x40000000, &(0x7f00000001c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) clone(0x80000000, &(0x7f0000000280)="2cd9b60d3c91b21282a1cdae288e3fa1443a65bef2bb1785cf43dc4304b79da5e56dc6770115e5c54faf220395d23601458688f20ac3b6b2b5a2f0080d3025f376f97f3a3a75a7cb40cc69790663ba1101a5e43f28f7067768807a914f6b1ce3a796506489d40937e3754dd736baf99206d41c45a4a6e34a716bec139447597843959c4a125edc9faf2d58e1bb2396503fa245d50c0575fa1e5ab6c9405cb9450fb361f93476a84a26548f540f280c9a97315c0276ed6afd95f47463b7aa", &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) clone(0x1030000, &(0x7f00000003c0)="68b3861d4837ba93b4093d63e64b72eac2f9774e0848620c661f334e077ee0e077beffe706e4e0f4a197cb21724b5dfd5481652c64f3f134b62119d73918df559f737cd661f001e650d6a1e09571cab03b64a9565f921b369180660f4cf6ae81d424a7304a0b0ab8871dbb4a05db8763a079bacac27a03a74a5f4918bb035d118765292ab8", &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="dfc243be1666a88d4d1aabf8714094d32fd0286c73bd964dda") 01:13:28 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000600000018000000a46b12ecfcc8f780495d994e786f7d529646b824f27d1fbdcb3bdd8891d51b7752adc16d1165a7dcfaec9aa948abea1a931365f33736ce41c8d134a63b9b00000000000000", @ANYRES32=r2, @ANYBLOB="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"]) r4 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x210082) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1001, 0x2008}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r4, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800, 0x2], [], [0x0, 0x20000000000]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f0000000600)=ANY=[@ANYBLOB="016508000026909c144f67d49a0f6d16684f7b71d95fa2bbaf0be959fcae3b66e6b69470f949288c7e178690ec6be1e0a89fe26a9e568155df8fa7ae363a2bc275dfd7258947cae8be4b3961cace6184c249c39e8538b44fab2f887540228dea59fc63692ba198662c80298d2e094310ad2b3c390ba2cd07e2f3e28584cd66eb05043ede177bfa7d662d7b15b373d49a4088708b3f6f35eed3cc657afa844b5d811888074b1960ea7eda23b21af68d9aba2a27520c9793d95a69356f325a3d8808652922e1fd5f7690686175a17be39d80db97777cecbd773f1ac5", @ANYRES32=r4, @ANYBLOB="acdfc427000000002e2f66696c6530005072cc351cfe11000400002ec11e3e14ab02d2f83b4433c447da4a6d337b0bd20696352aae27d7d3101876714bee5951426d7b453b2fa451d52dcc3f98ead8f45d4a2f4ae0b14f4bfdafb3ac5dd1833eeca6b44abaae164f301ace6d8ea311410d8ab4b00b57d88dfc94111c663a0942443771d60a223a6c885516ecab8ed24cc28a57349832d5f16de751a12adc6aca6c4c40185f010298b67bb0c8ecddf7376a5e89c8cdbbbbbbff318203e2317255d50f557bba03eefb0c5dbb"]) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f00000000c0)={0x5, 0x0, 0xd7}) 01:13:29 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x6000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1131.536957][ T7311] BPF:[1] FUNC_PROTO (anon) [ 1131.542707][ T7311] BPF:return=0 args=( [ 1131.546710][ T7311] BPF:0 (anon) [ 1131.550086][ T7311] BPF:, 2 [ 1131.554540][ T7311] BPF:) [ 1131.557309][ T7311] BPF: [ 1131.560066][ T7311] BPF:Invalid arg#1 [ 1131.565124][ T7311] BPF: [ 1131.565124][ T7311] [ 1131.567626][ T7315] BPF:[1] FUNC_PROTO (anon) [ 1131.575764][ T7315] BPF:return=0 args=( [ 1131.579794][ T7315] BPF:0 [ 1131.583941][ T7315] BPF:, 76 (anon) [ 1131.587582][ T7315] BPF:) [ 1131.590344][ T7315] BPF: [ 1131.594453][ T7315] BPF:Invalid arg#1 [ 1131.598270][ T7315] BPF: [ 1131.598270][ T7315] [ 1131.632359][ T7317] BPF:[1] FUNC_PROTO (anon) [ 1131.637037][ T7317] BPF:return=0 args=( [ 1131.642313][ T7317] BPF:0 [ 1131.645178][ T7317] BPF:, 76 (anon) [ 1131.648812][ T7317] BPF:) [ 1131.653025][ T7317] BPF: [ 1131.655800][ T7317] BPF:Invalid arg#1 [ 1131.659148][ T7314] BPF:[1] FUNC_PROTO (anon) [ 1131.659598][ T7317] BPF: [ 1131.659598][ T7317] [ 1131.672567][ T7314] BPF:return=0 args=( [ 1131.676589][ T7314] BPF:0 (anon) [ 1131.679959][ T7314] BPF:, 2 [ 1131.684217][ T7314] BPF:) [ 1131.686993][ T7314] BPF: [ 1131.689755][ T7314] BPF:Invalid arg#1 [ 1131.694646][ T7314] BPF: [ 1131.694646][ T7314] [ 1131.731701][ T7328] device vlan1340 entered promiscuous mode [ 1131.819126][ T7334] BPF:[1] FUNC_PROTO (anon) [ 1131.825019][ T7334] BPF:return=0 args=( [ 1131.829019][ T7334] BPF:24576 (anon) [ 1131.834165][ T7334] BPF:, 0 [ 1131.837208][ T7334] BPF:, vararg [ 1131.842191][ T7334] BPF:) [ 1131.844972][ T7334] BPF: [ 1131.845088][ T7337] BPF:[1] FUNC_PROTO (anon) [ 1131.847732][ T7334] BPF:Invalid arg#1 [ 1131.847743][ T7334] BPF: [ 1131.847743][ T7334] [ 1131.863621][ T7337] BPF:return=0 args=( 01:13:29 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x8000000, &(0x7f0000000180)="215c24d6f8e7f595d5d5b5f8ced29bf2b803d494d1612942112e8de8", &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="00cd3d72c5735931d25432ae924e54faef0151caf4b0dbaf377140fd77ad29c8d9b9cbcd3160129caecd41cbe88f7c169a1338d6cd96c4f4ee4087b814f1d84c854242") clone(0x70100800, &(0x7f00000002c0)="ae800473a765202803dbc41eb58c62a22206a38cfab616be1fb1019529a483c5c998705f63036a76fe28e8fa2a1084244e55df58c752c5a7ff541d7b8acc5d769ad3404cd7e121126673c05797fb4eb5ec88ef54b9b486f0fc2a3da52bc0b0f469cbfdfabf74b3d4f7481301f3aaad44eabf916538b896e91595781b95c12c1f11fb2449d9f7ca6837a36c55e52c36674214d31e5632226a3ca016816148", &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="7979118a20") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="9feb01000daf8b72d74375271c0000001c00000002000000000000000200000d0000000000000000000000000100b5c980860000020000000000"], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:29 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000600000018000000a46b12ecfcc8f780495d994e786f7d529646b824f27d1fbdcb3bdd8891d51b7752adc16d1165a7dcfaec9aa948abea1a931365f33736ce41c8d134a63b9b00000000000000", @ANYRES32=r2, @ANYBLOB="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"]) r4 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x210082) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1001, 0x2008}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r4, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800, 0x2], [], [0x0, 0x20000000000]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f0000000600)=ANY=[@ANYBLOB="016508000026909c144f67d49a0f6d16684f7b71d95fa2bbaf0be959fcae3b66e6b69470f949288c7e178690ec6be1e0a89fe26a9e568155df8fa7ae363a2bc275dfd7258947cae8be4b3961cace6184c249c39e8538b44fab2f887540228dea59fc63692ba198662c80298d2e094310ad2b3c390ba2cd07e2f3e28584cd66eb05043ede177bfa7d662d7b15b373d49a4088708b3f6f35eed3cc657afa844b5d811888074b1960ea7eda23b21af68d9aba2a27520c9793d95a69356f325a3d8808652922e1fd5f7690686175a17be39d80db97777cecbd773f1ac5", @ANYRES32=r4, @ANYBLOB="acdfc427000000002e2f66696c6530005072cc351cfe11000400002ec11e3e14ab02d2f83b4433c447da4a6d337b0bd20696352aae27d7d3101876714bee5951426d7b453b2fa451d52dcc3f98ead8f45d4a2f4ae0b14f4bfdafb3ac5dd1833eeca6b44abaae164f301ace6d8ea311410d8ab4b00b57d88dfc94111c663a0942443771d60a223a6c885516ecab8ed24cc28a57349832d5f16de751a12adc6aca6c4c40185f010298b67bb0c8ecddf7376a5e89c8cdbbbbbbff318203e2317255d50f557bba03eefb0c5dbb"]) [ 1131.867611][ T7337] BPF:24576 (anon) [ 1131.872568][ T7337] BPF:, 0 [ 1131.875598][ T7337] BPF:, vararg [ 1131.878965][ T7337] BPF:) [ 1131.882885][ T7337] BPF: [ 1131.885655][ T7337] BPF:Invalid arg#1 [ 1131.889464][ T7337] BPF: [ 1131.889464][ T7337] 01:13:29 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x5f}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:29 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x6800}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x160e, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1132.036811][ T7342] BPF:btf_header not found [ 1132.081884][ T7348] BPF:btf_header not found 01:13:29 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xc000a00, &(0x7f0000000180)="3aee0d9a3d81544d929195f6a3e014665b160face331a2a45ff4e419239885c141243861cf9c9382d35d76f717d2ab1bba4df70b2469412c9e283700bc8427486ce31286fedd2ba10d015204146c41cd5d499bd3bd2388d32d97b8ecbee68614af7d34fef348cc447d7fb435ed6fac4284b2d1beac18607b19df7a240bdbce5e2a150a92459f3c875659cde34b961694696912c43d585303a37dda", &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="350b44f9efb9685c691d05ddd0f6b2146d122ad0f55fe7012abd177a68b57c3a2540fe2709c77103b76d23bc3a92f04c64089ffdb6f09a0f7c3f98e8f860072070cfdb7260cd60c3e710ddfa961290890d72efcc06642e2c50a71715365dad1895a4342bcd359f5cb7e7faab17a7efecc9c7d7c940a2ad984e5fcf08bc173a4538af49bd3f31869d946145af0ed47334f8b36536d87cc65b5b8c28442877e448c9888fc3f4") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x1}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1132.212982][ T7364] BPF:[1] FUNC_PROTO (anon) [ 1132.217606][ T7364] BPF:return=0 args=( [ 1132.222966][ T7364] BPF:0 [ 1132.225833][ T7364] BPF:, 95 (anon) [ 1132.229465][ T7364] BPF:) [ 1132.233385][ T7364] BPF: [ 1132.236166][ T7364] BPF:Invalid arg#1 [ 1132.239981][ T7364] BPF: [ 1132.239981][ T7364] [ 1132.252108][ T7361] BPF:[1] FUNC_PROTO (anon) [ 1132.256792][ T7361] BPF:return=0 args=( [ 1132.262349][ T7361] BPF:26624 (anon) [ 1132.266083][ T7361] BPF:, 0 [ 1132.269114][ T7361] BPF:, vararg [ 1132.272555][ T7361] BPF:) [ 1132.275323][ T7361] BPF: [ 1132.278085][ T7361] BPF:Invalid arg#1 [ 1132.281701][ T7366] BPF:[1] FUNC_PROTO (anon) [ 1132.281946][ T7361] BPF: [ 1132.281946][ T7361] [ 1132.286461][ T7366] BPF:return=0 args=( [ 1132.297945][ T7366] BPF:0 [ 1132.302099][ T7366] BPF:, 95 (anon) [ 1132.305737][ T7366] BPF:) [ 1132.308498][ T7366] BPF: [ 1132.312441][ T7366] BPF:Invalid arg#1 [ 1132.316248][ T7366] BPF: [ 1132.316248][ T7366] [ 1132.336246][ T7370] BPF:[1] FUNC_PROTO (anon) [ 1132.342924][ T7370] BPF:return=0 args=( [ 1132.347299][ T7370] BPF:1 (anon) [ 1132.356194][ T7370] BPF:, 2 [ 1132.359059][ T7359] device vlan1341 entered promiscuous mode [ 1132.360433][ T7370] BPF:) [ 1132.360446][ T7370] BPF: [ 1132.360457][ T7370] BPF:Invalid arg#1 [ 1132.360467][ T7370] BPF: [ 1132.360467][ T7370] [ 1132.382413][ T7376] BPF:[1] FUNC_PROTO (anon) [ 1132.387655][ T7376] BPF:return=0 args=( [ 1132.394051][ T7376] BPF:1 (anon) [ 1132.397440][ T7376] BPF:, 2 [ 1132.400541][ T7376] BPF:) [ 1132.403312][ T7376] BPF: [ 1132.406079][ T7376] BPF:Invalid arg#1 [ 1132.409885][ T7376] BPF: [ 1132.409885][ T7376] 01:13:29 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x60}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:30 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x8040000, &(0x7f0000000180)="2750433ae305200eb6b59e77663977e220155f4dfb92bdaeb71cd96ed9cae77bc581f25c9b0e98b01d49d1874a0fbb8281bc6b74db2299ee0f2bab3336c865051fc6b930e7b60d14bc52633cd4c27da25983d5a21abd611dfa5387cfc64c2f0230a96adcbef10819882e6ac2cb4414d38a1911d12fefa6", &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="e7b9bcdbcfb468e231ee66e895770a93a7633585cf0da5d0a08f491cb6e9ea71348cec72be0c59b6f160") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000002000000000000000200000d00000000efffffffffffffff01000000020000000000"], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) clone(0x20000080, &(0x7f00000002c0)="ab259673a6344c25bc6073bca1c7397560d43b173573f4c0f6c35cdf0b5f9eaeee79c943093ad42a8937b3bfa62a322fa0909347e470489d78db905c6b36d3842682296f9868f9bea067deb9a9ee83094447a94bef3d4709bc46e71bf86b7c25c66281a909ddd6d7052f82e68153ffd3ef7da80a6d4cbad83b78092f462952fd1555f6f08c3b59abb8bd28f9026a05d222b2a911626a720772cbce9d29836a5e572521605c95aa3a116f9489a1d1119b2e517a189291ac81e5", &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="8dcb59ec16da2cbf2eb3043e1dacfd4ed08e6ef52bca234012359c97b3794882d052a73b48ecfb66d802aad59d89be357f28fbe2") 01:13:30 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x6c00}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1132.624557][ T7383] BPF:[1] FUNC_PROTO (anon) [ 1132.629235][ T7383] BPF:return=0 args=( [ 1132.635660][ T7383] BPF:0 [ 1132.638530][ T7383] BPF:, 96 (anon) [ 1132.643508][ T7383] BPF:) [ 1132.646287][ T7383] BPF: [ 1132.649058][ T7383] BPF:Invalid arg#1 [ 1132.654382][ T7383] BPF: [ 1132.654382][ T7383] 01:13:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x1900, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1132.692813][ T7384] BPF:[1] FUNC_PROTO (anon) [ 1132.697474][ T7384] BPF:return=0 args=( [ 1132.702850][ T7384] BPF:0 [ 1132.705718][ T7384] BPF:, 96 (anon) [ 1132.709354][ T7384] BPF:) [ 1132.713176][ T7384] BPF: [ 1132.715945][ T7384] BPF:Invalid arg#1 [ 1132.719747][ T7384] BPF: [ 1132.719747][ T7384] [ 1132.771922][ T7392] BPF:[1] FUNC_PROTO (anon) [ 1132.776554][ T7392] BPF:return=0 args=( [ 1132.780646][ T7392] BPF:27648 (anon) [ 1132.784377][ T7392] BPF:, 0 [ 1132.786960][ T7394] BPF:[1] FUNC_PROTO (anon) [ 1132.787401][ T7392] BPF:, vararg [ 1132.787413][ T7392] BPF:) [ 1132.787422][ T7392] BPF: [ 1132.787432][ T7392] BPF:Invalid arg#1 [ 1132.792062][ T7394] BPF:return=0 args=( [ 1132.792076][ T7394] BPF:27648 (anon) [ 1132.795428][ T7392] BPF: [ 1132.795428][ T7392] [ 1132.798178][ T7394] BPF:, 0 [ 1132.825007][ T7394] BPF:, vararg [ 1132.828385][ T7394] BPF:) [ 1132.832566][ T7394] BPF: [ 1132.835335][ T7394] BPF:Invalid arg#1 [ 1132.839134][ T7394] BPF: [ 1132.839134][ T7394] [ 1132.873443][ T7397] BPF:[1] FUNC_PROTO (anon) [ 1132.878129][ T7397] BPF:return=0 args=( [ 1132.883570][ T7397] BPF:4294967295 (invalid-name-offset) [ 1132.889049][ T7397] BPF:, 2 [ 1132.893082][ T7397] BPF:) [ 1132.895852][ T7397] BPF: [ 1132.898616][ T7397] BPF:Invalid arg#1 [ 1132.903590][ T7397] BPF: [ 1132.903590][ T7397] 01:13:30 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x68}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:30 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000600000018000000a46b12ecfcc8f780495d994e786f7d529646b824f27d1fbdcb3bdd8891d51b7752adc16d1165a7dcfaec9aa948abea1a931365f33736ce41c8d134a63b9b00000000000000", @ANYRES32=r2, @ANYBLOB="ffff8ae200005b002e2f66696c6530004040cd976d09e670516d510ad3e1e87e03af7f3156cc937ac91b95d401a519874fed66bfef23b19dabc7f6589342ce89574f38b3656e68c645bcaea00f4270dc17c11631547adda879521f3bc8d447480155a0529e9e7dbd5d543ba5c29dfd102a25e6a1bae3951264746cc6c90ca85ed5d4ae82f094687857fc5e3a1ed72cd7ca4154534626ff574519dd2af95758e22112c5019d36ff07000083f01ededbee118bdddbd599cb565dd423ae30a460018c11158fb9316700000000000000000000000000000000d1e5dc3dd64279ed722ac5462af1ca1d2f6ddc432338ec3006cb6aebad5074b6c11d297d43ef1e5568bc74c7b9311f1b439bd062a25919dd764b5cb631703a0326cb6e90255751fe9d6c08ffa6ec9e6e76f4507ed7a491242fe6aa317905de42599c1b2f79"]) r4 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x210082) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1001, 0x2008}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r4, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800, 0x2], [], [0x0, 0x20000000000]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f0000000600)=ANY=[@ANYBLOB="016508000026909c144f67d49a0f6d16684f7b71d95fa2bbaf0be959fcae3b66e6b69470f949288c7e178690ec6be1e0a89fe26a9e568155df8fa7ae363a2bc275dfd7258947cae8be4b3961cace6184c249c39e8538b44fab2f887540228dea59fc63692ba198662c80298d2e094310ad2b3c390ba2cd07e2f3e28584cd66eb05043ede177bfa7d662d7b15b373d49a4088708b3f6f35eed3cc657afa844b5d811888074b1960ea7eda23b21af68d9aba2a27520c9793d95a69356f325a3d8808652922e1fd5f7690686175a17be39d80db97777cecbd773f1ac5", @ANYRES32=r4, @ANYBLOB="acdfc427000000002e2f66696c6530005072cc351cfe11000400002ec11e3e14ab02d2f83b4433c447da4a6d337b0bd20696352aae27d7d3101876714bee5951426d7b453b2fa451d52dcc3f98ead8f45d4a2f4ae0b14f4bfdafb3ac5dd1833eeca6b44abaae164f301ace6d8ea311410d8ab4b00b57d88dfc94111c663a0942443771d60a223a6c885516ecab8ed24cc28a57349832d5f16de751a12adc6aca6c4c40185f010298b67bb0c8ecddf7376a5e89c8cdbbbbbbff318203e2317255d50f557bba03eefb0c5dbb"]) 01:13:30 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x7400}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1133.066728][ T7400] device vlan1342 entered promiscuous mode [ 1133.095085][ T7408] BPF:[1] FUNC_PROTO (anon) [ 1133.099749][ T7408] BPF:return=0 args=( [ 1133.106111][ T7408] BPF:0 [ 1133.108977][ T7408] BPF:, 104 (anon) [ 1133.114156][ T7408] BPF:) [ 1133.116932][ T7408] BPF: [ 1133.119700][ T7408] BPF:Invalid arg#1 [ 1133.124695][ T7408] BPF: [ 1133.124695][ T7408] [ 1133.148284][ T7409] BPF:[1] FUNC_PROTO (anon) [ 1133.154546][ T7409] BPF:return=0 args=( [ 1133.158537][ T7409] BPF:0 [ 1133.162697][ T7409] BPF:, 104 (anon) [ 1133.166788][ T7409] BPF:) [ 1133.169554][ T7409] BPF: [ 1133.173838][ T7409] BPF:Invalid arg#1 [ 1133.177656][ T7409] BPF: [ 1133.177656][ T7409] [ 1133.201729][ T7397] BPF:[1] FUNC_PROTO (anon) [ 1133.206397][ T7397] BPF:return=0 args=( [ 1133.211840][ T7397] BPF:4294967295 (invalid-name-offset) [ 1133.217319][ T7397] BPF:, 2 [ 1133.221528][ T7397] BPF:) [ 1133.224308][ T7397] BPF: [ 1133.227070][ T7397] BPF:Invalid arg#1 [ 1133.232031][ T7397] BPF: [ 1133.232031][ T7397] 01:13:30 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x6c}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x1901, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:30 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1133.355858][ T7420] BPF:[1] FUNC_PROTO (anon) [ 1133.361884][ T7420] BPF:return=0 args=( [ 1133.365912][ T7420] BPF:29696 (anon) [ 1133.369851][ T7420] BPF:, 0 [ 1133.374176][ T7420] BPF:, vararg [ 1133.377561][ T7420] BPF:) [ 1133.380429][ T7420] BPF: [ 1133.383196][ T7420] BPF:Invalid arg#1 [ 1133.387003][ T7420] BPF: [ 1133.387003][ T7420] [ 1133.470113][ T7427] BPF:[1] FUNC_PROTO (anon) [ 1133.478353][ T7427] BPF:return=0 args=( [ 1133.483951][ T7427] BPF:0 [ 1133.486823][ T7427] BPF:, 108 (anon) [ 1133.490587][ T7427] BPF:) [ 1133.493356][ T7427] BPF: [ 1133.496123][ T7427] BPF:Invalid arg#1 [ 1133.499933][ T7427] BPF: [ 1133.499933][ T7427] [ 1133.533050][ T7428] BPF:[1] FUNC_PROTO (anon) [ 1133.537700][ T7428] BPF:return=0 args=( [ 1133.542983][ T7428] BPF:0 [ 1133.545849][ T7428] BPF:, 108 (anon) [ 1133.549571][ T7428] BPF:) [ 1133.552411][ T7428] BPF: [ 1133.555179][ T7428] BPF:Invalid arg#1 [ 1133.559001][ T7428] BPF: [ 1133.559001][ T7428] [ 1133.594768][ T7436] BPF:Invalid magic 01:13:31 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x100) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xe, 0x3ff, 0xfa, 0x40, 0x8d, r1, 0x3, '\x00', 0x0, r0, 0x2, 0x0, 0x1}, 0x40) fcntl$setstatus(r1, 0x4, 0x40400) [ 1133.615168][ T7438] BPF:Invalid magic 01:13:31 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x7a00}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1133.637744][ T7439] device vlan1343 entered promiscuous mode 01:13:31 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x74}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1133.834489][ T7451] BPF:[1] FUNC_PROTO (anon) [ 1133.839198][ T7451] BPF:return=0 args=( [ 1133.844628][ T7451] BPF:0 (anon) [ 1133.847335][ T7454] BPF:[1] FUNC_PROTO (anon) [ 1133.848007][ T7451] BPF:, 2 [ 1133.854879][ T7454] BPF:return=0 args=( [ 1133.856764][ T7451] BPF:) [ 1133.860782][ T7454] BPF:31232 (anon) [ 1133.860796][ T7454] BPF:, 0 [ 1133.860805][ T7454] BPF:, vararg [ 1133.860815][ T7454] BPF:) [ 1133.860825][ T7454] BPF: [ 1133.860834][ T7454] BPF:Invalid arg#1 [ 1133.860844][ T7454] BPF: [ 1133.860844][ T7454] [ 1133.888453][ T7455] BPF:[1] FUNC_PROTO (anon) [ 1133.889125][ T7451] BPF: [ 1133.896000][ T7455] BPF:return=0 args=( [ 1133.898619][ T7451] BPF:Invalid arg#1 [ 1133.901395][ T7455] BPF:31232 (anon) [ 1133.901409][ T7455] BPF:, 0 [ 1133.905359][ T7451] BPF: [ 1133.905359][ T7451] [ 1133.909145][ T7455] BPF:, vararg [ 1133.927478][ T7455] BPF:) [ 1133.931577][ T7455] BPF: 01:13:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x1f00, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1133.934346][ T7455] BPF:Invalid arg#1 [ 1133.938150][ T7455] BPF: [ 1133.938150][ T7455] [ 1133.972979][ T7452] BPF:[1] FUNC_PROTO (anon) [ 1133.977660][ T7452] BPF:return=0 args=( [ 1133.982803][ T7452] BPF:0 (anon) [ 1133.985713][ T7461] BPF:[1] FUNC_PROTO (anon) [ 1133.986175][ T7452] BPF:, 2 [ 1133.992829][ T7461] BPF:return=0 args=( [ 1133.993797][ T7452] BPF:) [ 1133.997760][ T7461] BPF:0 [ 1134.000543][ T7452] BPF: [ 1134.000554][ T7452] BPF:Invalid arg#1 [ 1134.000562][ T7452] BPF: [ 1134.000562][ T7452] [ 1134.016957][ T7461] BPF:, 116 (anon) [ 1134.020732][ T7461] BPF:) [ 1134.023502][ T7461] BPF: [ 1134.026280][ T7461] BPF:Invalid arg#1 [ 1134.030088][ T7461] BPF: [ 1134.030088][ T7461] 01:13:31 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0xd200}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:31 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x4000400, &(0x7f0000000180)="d73fb6c0995f6b26474f892d749c2b45ff0e562d74427a66e41b51d79de0362695af40eb1e79193f46ec5dfb39a22cf42f2960d9efcd7f69865d3f22b5e3100a699ec05bd84cf05aebdc2fd3afcaa8265a9f18fff9a0a71bb5be", &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="0048b5c9113f29cd1dc93ef65010e2bbe81bc17a9f22") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x5c, 0x2, [@enum={0xd, 0xa, 0x0, 0x6, 0x4, [{0x9, 0xffffffff}, {0x6, 0x1}, {0x3, 0x401}, {0xb, 0x20}, {0x7, 0xfffffffe}, {0x0, 0x2}, {0x2, 0x1}, {0x5, 0x80000001}, {0xe, 0x400}, {0xf, 0x4}]}]}}, &(0x7f0000000040)=""/211, 0x76, 0xd3, 0x8}, 0x20) [ 1134.064914][ T7462] BPF:[1] FUNC_PROTO (anon) [ 1134.069526][ T7462] BPF:return=0 args=( [ 1134.075980][ T7462] BPF:0 [ 1134.078851][ T7462] BPF:, 116 (anon) [ 1134.083418][ T7462] BPF:) [ 1134.086464][ T7462] BPF: [ 1134.089229][ T7462] BPF:Invalid arg#1 [ 1134.094565][ T7462] BPF: [ 1134.094565][ T7462] 01:13:31 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000600000018000000a46b12ecfcc8f780495d994e786f7d529646b824f27d1fbdcb3bdd8891d51b7752adc16d1165a7dcfaec9aa948abea1a931365f33736ce41c8d134a63b9b00000000000000", @ANYRES32=r2, @ANYBLOB="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"]) r4 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x210082) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1001, 0x2008}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r4, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800, 0x2], [], [0x0, 0x20000000000]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f0000000600)=ANY=[@ANYBLOB="016508000026909c144f67d49a0f6d16684f7b71d95fa2bbaf0be959fcae3b66e6b69470f949288c7e178690ec6be1e0a89fe26a9e568155df8fa7ae363a2bc275dfd7258947cae8be4b3961cace6184c249c39e8538b44fab2f887540228dea59fc63692ba198662c80298d2e094310ad2b3c390ba2cd07e2f3e28584cd66eb05043ede177bfa7d662d7b15b373d49a4088708b3f6f35eed3cc657afa844b5d811888074b1960ea7eda23b21af68d9aba2a27520c9793d95a69356f325a3d8808652922e1fd5f7690686175a17be39d80db97777cecbd773f1ac5", @ANYRES32=r4, @ANYBLOB="acdfc427000000002e2f66696c6530005072cc351cfe11000400002ec11e3e14ab02d2f83b4433c447da4a6d337b0bd20696352aae27d7d3101876714bee5951426d7b453b2fa451d52dcc3f98ead8f45d4a2f4ae0b14f4bfdafb3ac5dd1833eeca6b44abaae164f301ace6d8ea311410d8ab4b00b57d88dfc94111c663a0942443771d60a223a6c885516ecab8ed24cc28a57349832d5f16de751a12adc6aca6c4c40185f010298b67bb0c8ecddf7376a5e89c8cdbbbbbbff318203e2317255d50f557bba03eefb0c5dbb"]) [ 1134.234000][ T7470] BPF:[1] FUNC_PROTO (anon) [ 1134.238672][ T7470] BPF:return=0 args=( [ 1134.244003][ T7470] BPF:53760 (anon) [ 1134.247742][ T7470] BPF:, 0 [ 1134.251799][ T7470] BPF:, vararg [ 1134.255182][ T7470] BPF:) [ 1134.257943][ T7470] BPF: [ 1134.261834][ T7470] BPF:Invalid arg#1 [ 1134.265650][ T7470] BPF: [ 1134.265650][ T7470] 01:13:31 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000002000000000000000200000d00000000000000002f1c92f401000000020000000000"], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1134.292843][ T7472] BPF:[1] FUNC_PROTO (anon) [ 1134.297503][ T7472] BPF:return=0 args=( [ 1134.302802][ T7472] BPF:53760 (anon) [ 1134.306526][ T7472] BPF:, 0 [ 1134.309542][ T7472] BPF:, vararg [ 1134.314389][ T7472] BPF:) [ 1134.317171][ T7472] BPF: [ 1134.319948][ T7472] BPF:Invalid arg#1 [ 1134.324884][ T7472] BPF: [ 1134.324884][ T7472] 01:13:31 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x7a}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1134.346199][ T7471] device vlan1344 entered promiscuous mode 01:13:31 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000600000018000000a46b12ecfcc8f780495d994e786f7d529646b824f27d1fbdcb3bdd8891d51b7752adc16d1165a7dcfaec9aa948abea1a931365f33736ce41c8d134a63b9b00000000000000", @ANYRES32=r2, @ANYBLOB="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"]) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x210082) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1001, 0x2008}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r3, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800, 0x2], [], [0x0, 0x20000000000]}) [ 1134.459857][ T7490] BPF:[1] FUNC_PROTO (anon) [ 1134.466023][ T7490] BPF:return=0 args=( [ 1134.470027][ T7490] BPF:4103216175 (anon) [ 1134.474287][ T7490] BPF:, 2 [ 1134.477317][ T7490] BPF:) [ 1134.480088][ T7490] BPF: [ 1134.482905][ T7490] BPF:Invalid arg#1 [ 1134.486715][ T7490] BPF: [ 1134.486715][ T7490] [ 1134.504300][ T7491] BPF:[1] FUNC_PROTO (anon) 01:13:32 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0xfffff}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1134.508940][ T7491] BPF:return=0 args=( [ 1134.514277][ T7491] BPF:4103216175 (anon) [ 1134.518452][ T7491] BPF:, 2 [ 1134.522749][ T7491] BPF:) [ 1134.525521][ T7491] BPF: [ 1134.528277][ T7491] BPF:Invalid arg#1 [ 1134.533404][ T7491] BPF: [ 1134.533404][ T7491] [ 1134.582570][ T7496] BPF:[1] FUNC_PROTO (anon) [ 1134.587230][ T7496] BPF:return=0 args=( [ 1134.592483][ T7496] BPF:0 [ 1134.595352][ T7496] BPF:, 122 (anon) [ 1134.599292][ T7496] BPF:) [ 1134.603391][ T7496] BPF: [ 1134.606185][ T7496] BPF:Invalid arg#1 [ 1134.609994][ T7496] BPF: [ 1134.609994][ T7496] 01:13:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x2000, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1134.636342][ T7498] BPF:[1] FUNC_PROTO (anon) [ 1134.642171][ T7498] BPF:return=0 args=( [ 1134.646164][ T7498] BPF:0 [ 1134.649034][ T7498] BPF:, 122 (anon) [ 1134.654254][ T7498] BPF:) [ 1134.657050][ T7498] BPF: [ 1134.659816][ T7498] BPF:Invalid arg#1 [ 1134.664799][ T7498] BPF: [ 1134.664799][ T7498] 01:13:32 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) clone(0x100, &(0x7f0000000180)="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", &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000001200)="10cbdb2ba1004366083a7254234439fa86c546afdde700a5308799e7a2115ba8c7") 01:13:32 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0xd2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1134.804525][ T7509] BPF:[1] FUNC_PROTO (anon) [ 1134.809154][ T7509] BPF:return=0 args=( [ 1134.814419][ T7509] BPF:1048575 (anon) [ 1134.818335][ T7509] BPF:, 0 [ 1134.822708][ T7509] BPF:, vararg [ 1134.826091][ T7509] BPF:) [ 1134.828858][ T7509] BPF: [ 1134.833017][ T7509] BPF:Invalid arg#1 [ 1134.836835][ T7509] BPF: [ 1134.836835][ T7509] [ 1134.858739][ T7510] BPF:[1] FUNC_PROTO (anon) [ 1134.864712][ T7510] BPF:return=0 args=( [ 1134.868708][ T7510] BPF:1048575 (anon) [ 1134.872686][ T7510] BPF:, 0 [ 1134.875708][ T7510] BPF:, vararg [ 1134.879077][ T7510] BPF:) [ 1134.881921][ T7510] BPF: [ 1134.884687][ T7510] BPF:Invalid arg#1 [ 1134.888491][ T7510] BPF: [ 1134.888491][ T7510] [ 1134.988808][ T7515] device vlan1345 entered promiscuous mode [ 1135.008424][ T7518] BPF:[1] FUNC_PROTO (anon) [ 1135.014704][ T7518] BPF:return=0 args=( [ 1135.018706][ T7518] BPF:0 (anon) [ 1135.023504][ T7518] BPF:, 2 [ 1135.026546][ T7518] BPF:) [ 1135.029319][ T7518] BPF: [ 1135.033105][ T7518] BPF:Invalid arg#1 01:13:32 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0xffffff}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1135.036930][ T7518] BPF: [ 1135.036930][ T7518] [ 1135.066463][ T7524] BPF:[1] FUNC_PROTO (anon) [ 1135.072627][ T7524] BPF:return=0 args=( [ 1135.076627][ T7524] BPF:0 (anon) [ 1135.079997][ T7524] BPF:, 2 [ 1135.084001][ T7524] BPF:) [ 1135.086775][ T7524] BPF: [ 1135.089531][ T7524] BPF:Invalid arg#1 [ 1135.094482][ T7524] BPF: [ 1135.094482][ T7524] [ 1135.096236][ T7529] BPF:[1] FUNC_PROTO (anon) [ 1135.105511][ T7529] BPF:return=0 args=( [ 1135.109521][ T7529] BPF:0 [ 1135.112438][ T7529] BPF:, 210 (anon) [ 1135.116158][ T7529] BPF:) [ 1135.118922][ T7529] BPF: [ 1135.121765][ T7529] BPF:Invalid arg#1 [ 1135.125575][ T7529] BPF: [ 1135.125575][ T7529] [ 1135.147630][ T7533] BPF:[1] FUNC_PROTO (anon) [ 1135.153713][ T7533] BPF:return=0 args=( [ 1135.157709][ T7533] BPF:0 [ 1135.162403][ T7533] BPF:, 210 (anon) 01:13:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x2001, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1135.166143][ T7533] BPF:) [ 1135.168912][ T7533] BPF: [ 1135.171729][ T7533] BPF:Invalid arg#1 [ 1135.175625][ T7533] BPF: [ 1135.175625][ T7533] 01:13:32 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x300}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:32 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x18240, 0x1a1) write$binfmt_misc(r0, &(0x7f00000001c0)={'syz1', "594157b090d5356b9821a32fe89916eb51a52cd6807437f81930b70803c7ad6be868493805ddf3848fdcd919139a7cc39d3a143e3bd972f9132d76e77559de681f959fa5ae8f241543f68171ede5cc215a0577c9ac3be8fb75a3d35ae313c0bc34c374a072c1281d9be06df00113ee8b7b03dcd689ebb7ad206bdd470ae599cea0507c9f70c2e06bf725418edfd700c4c7acfea54a6d05bb5d36e1906d6d9b5f51ead63f5cdce80028f137ca18b4e721c847bb9dfbecbe0883c095bfa934b96105b4c072ea1edee90a"}, 0xcd) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x20b000) mknodat(r1, &(0x7f00000002c0)='./file1\x00', 0x4, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xfffffffc}, {0x1, 0x2}]}]}, {0x0, [0x2e, 0x61]}}, &(0x7f0000000040)=""/211, 0x38, 0xd3, 0x8}, 0x20) [ 1135.282926][ T7539] BPF:[1] FUNC_PROTO (anon) [ 1135.287613][ T7539] BPF:return=0 args=( [ 1135.292752][ T7539] BPF:16777215 (anon) [ 1135.296752][ T7539] BPF:, 0 [ 1135.299781][ T7539] BPF:, vararg [ 1135.304468][ T7539] BPF:) [ 1135.307242][ T7539] BPF: [ 1135.310007][ T7539] BPF:Invalid arg#1 [ 1135.315708][ T7539] BPF: [ 1135.315708][ T7539] [ 1135.336111][ T7540] BPF:[1] FUNC_PROTO (anon) [ 1135.343624][ T7540] BPF:return=0 args=( [ 1135.347624][ T7540] BPF:16777215 (anon) [ 1135.352860][ T7540] BPF:, 0 [ 1135.355906][ T7540] BPF:, vararg [ 1135.359273][ T7540] BPF:) [ 1135.363192][ T7540] BPF: [ 1135.365967][ T7540] BPF:Invalid arg#1 [ 1135.369772][ T7540] BPF: [ 1135.369772][ T7540] [ 1135.387741][ T7543] BPF:[1] FUNC_PROTO (anon) [ 1135.395444][ T7543] BPF:return=0 args=( [ 1135.399476][ T7543] BPF:0 (invalid-name-offset) [ 1135.405526][ T7543] BPF:, 2 .a [ 1135.408742][ T7543] BPF:) [ 1135.412875][ T7543] BPF: [ 1135.415645][ T7543] BPF:Invalid arg#1 [ 1135.419775][ T7543] BPF: [ 1135.419775][ T7543] [ 1135.443679][ T7548] BPF:[1] FUNC_PROTO (anon) [ 1135.448366][ T7548] BPF:return=0 args=( [ 1135.453499][ T7548] BPF:0 (invalid-name-offset) [ 1135.458201][ T7548] BPF:, 2 .a [ 1135.461451][ T7548] BPF:) [ 1135.464216][ T7548] BPF: [ 1135.466979][ T7548] BPF:Invalid arg#1 [ 1135.470835][ T7548] BPF: [ 1135.470835][ T7548] [ 1135.521956][ T7552] BPF:[1] FUNC_PROTO (anon) [ 1135.526631][ T7552] BPF:return=0 args=( [ 1135.531898][ T7552] BPF:0 [ 1135.534767][ T7552] BPF:, 768 (anon) [ 1135.538489][ T7552] BPF:) [ 1135.542575][ T7552] BPF: [ 1135.545361][ T7552] BPF:Invalid arg#1 [ 1135.549166][ T7552] BPF: [ 1135.549166][ T7552] 01:13:33 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000600000018000000a46b12ecfcc8f780495d994e786f7d529646b824f27d1fbdcb3bdd8891d51b7752adc16d1165a7dcfaec9aa948abea1a931365f33736ce41c8d134a63b9b00000000000000", @ANYRES32=r2, @ANYBLOB="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"]) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x210082) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1001, 0x2008}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r3, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800, 0x2], [], [0x0, 0x20000000000]}) [ 1135.573521][ T7551] device vlan1346 entered promiscuous mode [ 1135.576752][ T7553] BPF:[1] FUNC_PROTO (anon) [ 1135.585039][ T7553] BPF:return=0 args=( [ 1135.589034][ T7553] BPF:0 [ 1135.593200][ T7553] BPF:, 768 (anon) [ 1135.596927][ T7553] BPF:) [ 1135.599692][ T7553] BPF: [ 1135.602513][ T7553] BPF:Invalid arg#1 [ 1135.606330][ T7553] BPF: [ 1135.606330][ T7553] 01:13:33 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x500}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:33 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000600000018000000a46b12ecfcc8f780495d994e786f7d529646b824f27d1fbdcb3bdd8891d51b7752adc16d1165a7dcfaec9aa948abea1a931365f33736ce41c8d134a63b9b00000000000000", @ANYRES32=r2, @ANYBLOB="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"]) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x210082) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1001, 0x2008}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) 01:13:33 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x1000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x2c00, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:33 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000180)=""/225, 0x36, 0xe1, 0x8}, 0x20) 01:13:33 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000600000018000000a46b12ecfcc8f780495d994e786f7d529646b824f27d1fbdcb3bdd8891d51b7752adc16d1165a7dcfaec9aa948abea1a931365f33736ce41c8d134a63b9b00000000000000", @ANYRES32=r2, @ANYBLOB="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"]) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x210082) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1001, 0x2008}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) dup2(0xffffffffffffffff, r2) [ 1135.904822][ T7577] BPF:[1] FUNC_PROTO (anon) [ 1135.909499][ T7577] BPF:return=0 args=( [ 1135.914868][ T7577] BPF:0 (anon) [ 1135.918258][ T7577] BPF:, 2 [ 1135.921335][ T7577] BPF:) [ 1135.924102][ T7577] BPF: [ 1135.926870][ T7577] BPF:Invalid arg#1 [ 1135.930719][ T7577] BPF: [ 1135.930719][ T7577] [ 1135.935454][ T7581] BPF:[1] FUNC_PROTO (anon) [ 1135.942609][ T7581] BPF:return=0 args=( [ 1135.946638][ T7581] BPF:16777216 (anon) [ 1135.952066][ T7581] BPF:, 0 [ 1135.955101][ T7581] BPF:, vararg [ 1135.958473][ T7581] BPF:) [ 1135.962445][ T7581] BPF: [ 1135.965226][ T7581] BPF:Invalid arg#1 [ 1135.969032][ T7581] BPF: [ 1135.969032][ T7581] [ 1135.983083][ T7582] BPF:[1] FUNC_PROTO (anon) [ 1135.987207][ T7579] BPF:[1] FUNC_PROTO (anon) [ 1135.987774][ T7582] BPF:return=0 args=( [ 1135.993744][ T7579] BPF:return=0 args=( [ 1135.993758][ T7579] BPF:0 (anon) [ 1135.993770][ T7579] BPF:, 2 [ 1135.993778][ T7579] BPF:) [ 1135.993787][ T7579] BPF: [ 1135.993797][ T7579] BPF:Invalid arg#1 [ 1135.993806][ T7579] BPF: [ 1135.993806][ T7579] [ 1136.026039][ T7588] device vlan1347 entered promiscuous mode [ 1136.026894][ T7582] BPF:16777216 (anon) [ 1136.037111][ T7582] BPF:, 0 [ 1136.042769][ T7582] BPF:, vararg [ 1136.046152][ T7582] BPF:) [ 1136.048919][ T7582] BPF: [ 1136.051843][ T7582] BPF:Invalid arg#1 [ 1136.055648][ T7582] BPF: [ 1136.055648][ T7582] [ 1136.094931][ T7595] BPF:[1] FUNC_PROTO (anon) [ 1136.099614][ T7595] BPF:return=0 args=( [ 1136.104874][ T7595] BPF:0 [ 1136.107742][ T7595] BPF:, 1280 (anon) [ 1136.111588][ T7595] BPF:) [ 1136.114354][ T7595] BPF: [ 1136.117151][ T7595] BPF:Invalid arg#1 [ 1136.121000][ T7595] BPF: [ 1136.121000][ T7595] [ 1136.148407][ T7596] BPF:[1] FUNC_PROTO (anon) [ 1136.154279][ T7596] BPF:return=0 args=( [ 1136.158268][ T7596] BPF:0 [ 1136.162646][ T7596] BPF:, 1280 (anon) [ 1136.166455][ T7596] BPF:) [ 1136.169216][ T7596] BPF: [ 1136.173213][ T7596] BPF:Invalid arg#1 [ 1136.177030][ T7596] BPF: [ 1136.177030][ T7596] 01:13:33 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x28000000, &(0x7f0000000180)="ae5ba5fa", &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="5492754be6ac294389cd29821f0c3b96b7b93e10ba2f60be53cb945930ed7d26ec15cd93ab31a9b78996213c3b788450d619efb1c31846ef9df0ab7c878ace21f2838f900b43d65628db63f0f7699cee314c43bbf6b17f96042bebd837fa116253aaac134f3f7fd2c3fe91b93be4db52a8818531a488e341b8cc5934ceeb2c89dd15b2916c3c07cf43c20be031d61174b79e51b0a612aa5290be34d0859433192e0f") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)=""/211, 0x1a, 0xd3, 0x8}, 0x20) 01:13:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x3201, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:33 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x600}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:33 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x2000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1136.363640][ T7607] BPF:No type found 01:13:33 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1136.406592][ T7610] BPF:No type found [ 1136.525970][ T7617] BPF:[1] FUNC_PROTO (anon) [ 1136.531844][ T7617] BPF:return=0 args=( [ 1136.535842][ T7617] BPF:0 [ 1136.538701][ T7617] BPF:, 1536 (anon) [ 1136.543768][ T7617] BPF:) [ 1136.546548][ T7617] BPF: [ 1136.549316][ T7617] BPF:Invalid arg#1 [ 1136.554609][ T7617] BPF: [ 1136.554609][ T7617] [ 1136.569648][ T7618] BPF:[1] FUNC_PROTO (anon) [ 1136.575692][ T7618] BPF:return=0 args=( [ 1136.579686][ T7618] BPF:0 [ 1136.583643][ T7618] BPF:, 1536 (anon) [ 1136.587473][ T7618] BPF:) [ 1136.591922][ T7618] BPF: [ 1136.594703][ T7618] BPF:Invalid arg#1 [ 1136.595087][ T7622] device vlan1348 entered promiscuous mode [ 1136.598504][ T7618] BPF: [ 1136.598504][ T7618] [ 1136.658654][ T7631] BPF:[1] FUNC_PROTO (anon) [ 1136.664626][ T7631] BPF:return=0 args=( [ 1136.666774][ T7633] BPF:[1] FUNC_PROTO (anon) [ 1136.668624][ T7631] BPF:0 (anon) [ 1136.668637][ T7631] BPF:, 2 [ 1136.668647][ T7631] BPF:) [ 1136.668656][ T7631] BPF: [ 1136.668666][ T7631] BPF:Invalid arg#1 [ 1136.675629][ T7633] BPF:return=0 args=( [ 1136.676705][ T7631] BPF: [ 1136.676705][ T7631] [ 1136.679702][ T7633] BPF:0 (anon) [ 1136.693235][ T7632] BPF:[1] FUNC_PROTO (anon) 01:13:34 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x3000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1136.693252][ T7632] BPF:return=0 args=( [ 1136.693265][ T7632] BPF:33554432 (anon) [ 1136.693277][ T7632] BPF:, 0 [ 1136.693287][ T7632] BPF:, vararg [ 1136.693296][ T7632] BPF:) [ 1136.693305][ T7632] BPF: [ 1136.693315][ T7632] BPF:Invalid arg#1 [ 1136.693325][ T7632] BPF: [ 1136.693325][ T7632] [ 1136.737032][ T7633] BPF:, 2 [ 1136.740144][ T7633] BPF:) [ 1136.742916][ T7633] BPF: [ 1136.745688][ T7633] BPF:Invalid arg#1 [ 1136.749509][ T7633] BPF: [ 1136.749509][ T7633] 01:13:34 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x700}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:34 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000023d8cf400001c00000002000000000000000200000d000000000000000000000800010000000200000b0000"], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000100)) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000200)={0x1f, 0x2, 0x4, 0x40, 0x8, {r1, r2/1000+10000}, {0x5, 0x2, 0x7, 0x0, 0x6, 0x7, "6e324da8"}, 0x6, 0x2, @userptr=0x2e7, 0x1, 0x0, r3}) syncfs(r0) [ 1136.965247][ T7639] BPF:[1] FUNC_PROTO (anon) [ 1136.969911][ T7639] BPF:return=0 args=( [ 1136.975300][ T7639] BPF:0 [ 1136.978173][ T7639] BPF:, 1792 (anon) [ 1136.983127][ T7639] BPF:) [ 1136.985899][ T7639] BPF: [ 1136.988671][ T7639] BPF:Invalid arg#1 [ 1136.993567][ T7639] BPF: [ 1136.993567][ T7639] [ 1137.004787][ T7643] BPF:[1] FUNC_PROTO (anon) [ 1137.009452][ T7643] BPF:return=0 args=( [ 1137.014722][ T7643] BPF:50331648 (anon) [ 1137.016825][ T7644] BPF:[1] FUNC_PROTO (anon) [ 1137.018713][ T7643] BPF:, 0 [ 1137.018725][ T7643] BPF:, vararg [ 1137.018734][ T7643] BPF:) [ 1137.018744][ T7643] BPF: [ 1137.025626][ T7644] BPF:return=0 args=( [ 1137.027818][ T7643] BPF:Invalid arg#1 [ 1137.031185][ T7644] BPF:0 [ 1137.031198][ T7644] BPF:, 1792 (anon) [ 1137.031207][ T7644] BPF:) [ 1137.031216][ T7644] BPF: [ 1137.031225][ T7644] BPF:Invalid arg#1 01:13:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x3203, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1137.031234][ T7644] BPF: [ 1137.031234][ T7644] [ 1137.068573][ T7643] BPF: [ 1137.068573][ T7643] 01:13:34 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000600000018000000a46b12ecfcc8f780495d994e786f7d529646b824f27d1fbdcb3bdd8891d51b7752adc16d1165a7dcfaec9aa948abea1a931365f33736ce41c8d134a63b9b00000000000000", @ANYRES32=r2, @ANYBLOB="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"]) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x210082) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1001, 0x2008}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) dup2(0xffffffffffffffff, r2) [ 1137.107286][ T7645] BPF:[1] FUNC_PROTO (anon) [ 1137.113181][ T7645] BPF:return=0 args=( [ 1137.117179][ T7645] BPF:50331648 (anon) [ 1137.122746][ T7645] BPF:, 0 [ 1137.125782][ T7645] BPF:, vararg [ 1137.129153][ T7645] BPF:) [ 1137.131967][ T7645] BPF: [ 1137.134731][ T7645] BPF:Invalid arg#1 [ 1137.138533][ T7645] BPF: [ 1137.138533][ T7645] 01:13:34 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0xa00}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:34 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000002000000000000000200000d00000000000000000004000001000000020000000000"], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1137.256784][ T7654] BPF:Unsupported section found [ 1137.397323][ T7665] BPF:[1] FUNC_PROTO (anon) [ 1137.404265][ T7665] BPF:return=0 args=( [ 1137.408266][ T7665] BPF:0 [ 1137.412422][ T7665] BPF:, 2560 (anon) [ 1137.416241][ T7665] BPF:) [ 1137.419019][ T7665] BPF: [ 1137.419380][ T7666] device vlan1349 entered promiscuous mode [ 1137.421843][ T7665] BPF:Invalid arg#1 [ 1137.421855][ T7665] BPF: [ 1137.421855][ T7665] [ 1137.436094][ T7667] BPF:[1] FUNC_PROTO (anon) [ 1137.445783][ T7667] BPF:return=0 args=( [ 1137.449777][ T7667] BPF:0 [ 1137.454051][ T7667] BPF:, 2560 (anon) [ 1137.457869][ T7667] BPF:) [ 1137.461710][ T7667] BPF: [ 1137.464836][ T7667] BPF:Invalid arg#1 [ 1137.468641][ T7667] BPF: [ 1137.468641][ T7667] 01:13:35 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000600000018000000a46b12ecfcc8f780495d994e786f7d529646b824f27d1fbdcb3bdd8891d51b7752adc16d1165a7dcfaec9aa948abea1a931365f33736ce41c8d134a63b9b00000000000000", @ANYRES32=r2, @ANYBLOB="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"]) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x210082) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1001, 0x2008}) ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) [ 1137.495768][ T7672] BPF:[1] FUNC_PROTO (anon) [ 1137.501578][ T7672] BPF:return=0 args=( [ 1137.505619][ T7672] BPF:1024 (anon) [ 1137.509259][ T7672] BPF:, 2 [ 1137.513250][ T7672] BPF:) [ 1137.516091][ T7672] BPF: [ 1137.518870][ T7672] BPF:Invalid arg#1 [ 1137.524127][ T7672] BPF: [ 1137.524127][ T7672] [ 1137.549217][ T7673] BPF:[1] FUNC_PROTO (anon) [ 1137.555298][ T7673] BPF:return=0 args=( [ 1137.559296][ T7673] BPF:1024 (anon) [ 1137.564112][ T7673] BPF:, 2 [ 1137.567346][ T7673] BPF:) [ 1137.571255][ T7673] BPF: [ 1137.574023][ T7673] BPF:Invalid arg#1 [ 1137.577835][ T7673] BPF: [ 1137.577835][ T7673] 01:13:35 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x1c00}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:35 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x4000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:35 executing program 3: clone(0xe686f49c129fb8f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x44000, &(0x7f0000000000), &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="dee1aa83c79459f4bea936a66364027f1be107734f5bf3") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) clone(0x82000000, &(0x7f0000000380)="c1aa9174379374ac52118833d116f3abaf5f21a8e945a369be4c9bf2016498c24090ac2451a8a21213293c34b188e39d085f340aed0cfd2784f78930c64e191b3f6f875000b5b46e3c5b7050d30a8a10f6161f14b41216e1614fb17b88d064b4cd7db7b7ea19b57b0d0b9556a5d04114581827421e1f65c072c558bfbd06dbde2dc6ad3ca0e07261a68f213a5a71d84efa7ffc5f061a848311af11f0f58334f94be8f06746501575d89ee245a62ec7ade50d7f4e710fca8d330877e6a798792bea107b1c9f49113c557ac3b876908cc1e94f7451ea6b319157ef01afc511064fb62b1ad8900dc029893d5c814a24379002289cabd77a0c8171633162e37fbb71d433d4699923ce9e7a534047e3ca83bdf3d0d3b91719fabfac0fb587037d7e816668927e9e1476c95c17b8e362c6bc293bb7da74afda9bc1a5e397753c39526713ef3d93245a99f5f9da6cc566828fb85126d9b9003c8672669e25122a77df5f7104dc02a7e5e541dd1dde8dd8975190395e00e75a4921e99826f5adcca6501d211996316c09b5e4cbcb8c42c3fb59ecf784c081589a792102da48de481df46a82a36c35990b7a11bb6b31cbdd4a7e95cd6ef64a4cc4a33d751df5aaf85269258140474d52c7531242ec51705d86b5de098e339faf1ca80cbdc8167c6791bb8ed9c7311fd5b1ff8b8516993756297508ced20d224cdf69b375dfd38d4159d7170d948ab5096e0b688185c4a85b94154d5047708ad4f559c2eef338b584ea5f2b0656b0ae5dee37d75bc9a635292b8ded012d485700a3df475d50cf16b450d02468b511d5fc8b4f3f861d8bbec53f9af9dbcba6143eb7e2cd7893844f641c275163e39b104d74e9d883eed2f7291d228fbe92acc6484a4fa48e7810e0f2715a9121e6825190fc5c3513d55aa735b043597d5624833e6a3039dc55fc5390dc16995c7fd4c1360c09b57d722b1ce8d22dea81a1b72147b0eddc616ce6b99b41ff4b128426e1630240b0490a749b7a3a67c23ea983656cb788c6d79aab0f773964e3a4b6cbd47f217d4f9cde0371ed3fdfb60dd527383a5a35113b97068fbb8b23c0f1bf3953726154415158257abb0807bc258ce2fcc4d4fc3e71f96b6b41d5bfff5ecc6410d4e631af3db2abaf4511ab487b7ba89b1a8e7f8ec65d796c462f7b44181b05d864c0cd6985b9d2193aebe0d24d0461e94f080cc1a3b87f6f3e80b06f2db0343f380c565d20b8da6819e7d91b21379cb329473495e83976d574a79e88f850114adabe14abbb465c72a6ae9a9549fb5a322b2bbe0119aa4a97e087175648bae948ded75f2a14481b63d6209568c03638d4fdbc7f7054a2855593c8319fee5ea45f062df1caf93ff9bf51ecd239a9126c812a85ecd9d63eb84041cb5888dbd4dbf06e219c539164dc6f0ad1265c676438246ef9437f2ae4bc4b8ee2aa62597a0bc144b46cf07c6c62e4da3a20f02fe8098618159fca5f47021dcc252e89fc6cda34c418e73e2ac26ac8f1f7b3c98e916c132c7df3ee77542e1340019f850fac9b7d4d1a1905a56094cf95bc384916253e51b8ce734349594714731203ed67d7b96a575a718e466861da0353ce01b79e3b093492cf4550586d5f537813e071d2e5f9a1601f905f8e6ea00102959fb640a812eeba0671fc8a5d10c277d2034a5bd157bd7b6b451ea5690fd67b81f221eecf28ffc1a4d7be99987f7ffd71f84b5b478649e795035f269aae73b557f0329b24eda955d17f420920ec30ab7ef31f2c64fd7e87bb00ae31e5eef18424d5de0058195a9f5b78a98eb76d4b216a83db3b266e3177afc0f15600a51ebccd2c03119c53713190cd5c6326fd26d985337556c96d8959c6e8d5d3e37d5833e86c3280d146ec4cdebed8d6d1e10256da577f5966eb34aacd8fcd7bc51c5220b7ad5b37e4d5d7822b549cabef505ab87d2a085079b0b30c0fc59b6ed3031d7ace287a49d47e3f5399e287b1d3a2b0c3532cce1baf0fef66410cf7fc07b370ffc18e5c196d008820efe6edd8fab5cf7c46aebbbb190dd2bc248b2bcfa497fca34a1f07ab452060ca3c0ffd9e14a89087ebafa3562d0734561ec58f9801b26759189330e70f71ce7d7c7d3dd5fb0f56123e4f4143e5ffabbe018dc69f7cc79acb41c8ef7a5f8f293c88d5aaf9c8c67608db6c8fc84837f1b9ca6fc1c4f18d8de0892ab9140f232bb0e7036276ac936d4f5cbb8aa870a28162fb8a0d562277eaf8132f46e1d7f4f276329d278d142448b0bbc3410d704068889f7023b545dcb228b241bcb77dd4e57729f8738ac654fefd82112766f8288a4472a8c1ff90ca8a7ba8ad1212d791c653d76f0d9e8c9f284c03cb94547d98962692c4a5f17ac599638ce2be3a2edb8de254b960260f48b51084d13af796ba1aa225944682a7907108c55dd4fa0dd1db46ff6de472e317a9ff90b1f7c1169c7bd25882775e7918fb5f88a24ede5f6299049b6f1dfdf8542b7a39896516e1b0d2ed0edb0cac75fc11ecb2f490e955d4b9b22ffd1723af3f3e6cce8c23c1d21d0b9481a77a14099f41f7fbfd5b5ff048f9969088085944708bffd9d486009a580bc1b44629fd251f49c5408e57af951af853e23e942d42532369ec325caade567bae76e1ce0c7b05a96d859ac49a27cae0c40049feda2291fe1dab8d7ce226af4c94371b4e7430e411cc298623c3ba6a591a11cf0be7fcb6a310ae1d03db7f61eb8c3bac43f01be4d210b9354b669b69e474e56b9a77d27d1b74ba0c3b242662855a712234264262686dbddf081fcd6e3c45f7c24036d30248ee32cead4daac1deea0b9adcb875009278270afacc3f56f014b5df344a0129db4f8b57bdfded4fc8db11926b25b16953ec0995a2d2166ad1c1d3fcb407614579589a6db0a9f62890de3d5bccbcbbabe2888cd63868e132e747a37e458fbc99262ca79e538967249e175b20210a0babc9a3930abc957169d6873ef11c250c7b32871581d23cae41d8fae0a8dd11f4dd1f6431dcadbb3a0792038321da97d2f10e85da15620cd21884aa34c10def68b072874765a28c06525f34979a91fa089e346d87b42f93663bcd55a51f262e5fe7aeb73ff4ffdbd072d71d2a623a571564948ed4fb43bca604f184e50820e05485a5ceb577c3b9f90bdaaf52e5adfa7a4160eb7ee545014857b3afedb8c1d1005d7df19b45e085df7114b55a193868579e4c9644bc5f7764d67c82d95ad0af109b8c68314a91ebd97a311d9471b87b6e6679d8bd438d398d300cf6561a7e5c97d34d3fb56e68be7bd26e8f4c22cdb0d464ab723984974f055d043fca1addbea7b8f8afcef57cb3eb01293a87791d195f3626032df9209e454356e5634b9d91221d67e47ca56b281068f308f8f8cb8d50324aeef1559d7fd8459c13abfe35e43714e9098235745255ccaf14333d1a5160f3b04c5cce653de51113147ac198b71a516374fbdf64c5ae5f8eaf933a4c698182509bea9b9fde314b204efff86fb55dbed11a2998956a8787c8f2cde3e2437152a3515c3259ea6845a012caa059dddf8b0d8972a1a8006ba272c47ff9a0be87a46e2c0f9f205fe6cafe50619d09544d2aaf06cb9022fae1484b61ee73d2a32d2c0f47746d6fb74e5fd5a340c898fbddd7d337b7c6635aa8ca7503b99751525ee0c1800d63bb137f59bc7a2928da43b166ddd27d3350d7a5f672b91fff65dfe8820784068cf26a02b4dc3accf39fcf82b3222f98d0cc360816052ae11753ffd69b7602522c4f6250a1463163c4b4873932bad6c429be7fb1c08c4092f08df17d5d4191a8d6bedb77f4e40a35544725fc299643561963d7a6bc98520597e6a4334cd979f6ce1b120686596e57704b4046a1e781779757dae6c34fa46fda9042a76b43ac2f8ba568830b31fdb3dad34af4e3daeab6febe5f3dc87a38ad5c9b617b14f8953ea1350f3b38f717e3a527ffa5365bae210f7af0d2bee828b29bf41eb8e2b984010f4cc9ffd3cc306a0e542629d3fac5be382668c3290e2788eec3123c3dc2521cfdc7acb15b7963bc7a6851b0dcd25dc5eee89b84940e1693629132e1fdfc218fddabb5ad21794b14f0ae767b74eb39cf9877cbe534d170ac856e0d35fc8be07326095967140d5c446073ebd224da2b70baebca34bf309354317589ebe4a5f45b5c78c3dcb6ff575b70af34a9760d0f86258aaadda02e6b84536ea75c232dc33c76b7a81bfca1fc9da32809c29b30551e61f62c7bfa8f516623fd9b73908fd8d71416301f83d7faa2a4bec7569175c6e2a4defb343220643acd2b343ea42f36b81c3ba47050dcf5f94513b6b2df89f474a266e36ec9e88a52300fa982f6d1454ac0edac3cf20de721225152dd8afce21d9779d351c7c59a144d52c678cc2456f717228fae633cd9c8e1cba29e4ac734f4c5fd334e2320f85c5d38f0f61e09e1fce64dcf6582e570b39db6df5c9103c8b1b2d78cfdf88367bfe694dba28bbc5fa63e4fc62abbd7123844804ce4093442a6d681b223dc18c6f395b2d2cb94a5e88e2ccd6a24f03a5abb2e7426f0c9b62227ac341dba4e701f56c14f97b7b0fa149c78908d5eb9dbfb5e2322f15a7e52c69408adbfbf21278314f0a3ffa4389d82826ec347cdc22bf3161baa36ce2e6753029594c8f0acc36aea30963b2597221d9ca08055ef183d55b982f3285dd4e7864f1cf4e16009a2e28ce0e946038b587fc290b56d6ac8383ffb9d71554a6a7749dda19ad4708b977dc1b164f9be21362b6dc2fffdde82c47874e89846a952b7db55b6775f57289be935644347b796e006d62ad4386c463b039e845ddd2652cc2af177d7208e4eab970ca8bc6ec1151505d8fe7cd65fca29ee76130cbdae9d507a97cda712f039e25f00fb57bd8aa75c503f6e83320d9c40d5415be762af9ef26bd677c751ff3207cebc4d605624edeb45ffd361e13f3399840f0537cb0ca2eac9ac134475c130298780cc3157eee55fc5ec9d6114d4cd7d6be387db75247f630d3c6d39f706fe5580248ca5961a7322c3b07b58707ff0031eda9a643fb232a7a943264b5df61d84c1a82829504b8a9824fd06c50fde02064086b4e9ace134e177e0b9bd3067fa1a9f62f839e4e6d9434f5ef4d1ba5747853a227f78ba8b33e818cf4bbe342ffee7ff46a01cd6ead98970f7915be8b0341e952f491bf627408b55a83c0e430254d18d34ad2ee0d3f89816ebde2413129c35ccb95efb99f9bdf8329c52d1cd9e25643d3bc8d9858ad3f44892ba5c56762c12ab41cc9ef50852db51163ca1d1562d959d33794bdd81b87fef5124472dd4e4a3bb6b732cbde728b59cf8d75f5fdac39b586ba3e1da56c8019008fbda6f30994262cb011915612227059c6d4f85f1ed947001965aa70aca67f23a0ad75de8415811ae99b2955fd1964a6fe49813bfef0f59df2a311cf0ac464322d3b4a916d218e2e5ca1983ce9e502c2caac6843005851a3129b48ee47fb663e6a4008bf393ed31bb0d2f07134d2d45e4f2bcc2661bb1706ab8bb9d52ae5184b94fa1ad4d6c54a0813ac97aabd260d88ceb73bbf25316aa75198f1e8280bf4de55da9790c3a94cc2ba503784a4b4175b886b3949eaa19f67d1e57b9bb2fe865f59b4fb04f639dd925d30f83d742ae49ff0a19b47f111548108513558be858b27beb750e1892313422915772304de271662844d57b807caf6427e2eed3fc2d8e9b74aebf2903b1116c77619077a742995daf0ecaa813f9425e23bea3bcbd7367741fa05d2232c3d5cce8f90945fc353e6a015bd790f00f155f0fefd6824a17961dd1", &(0x7f0000000000), &(0x7f0000001380), &(0x7f00000013c0)="1e5e17f53dbeda76f357664875da405999af172208692e633dca8ebf9b52ae7169a20d9fd80e488df3d01f9b0789491311bd60a34a7b3611ddc13d633bb26a3a8c0bcef76dd0f95794ab04ac98cbd12efcc9ab8a150544f65ddf51fb51bef8939c5e5fc5715263f7a007a38e117326d9f7c4658a") 01:13:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x3f00, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:35 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000600000018000000a46b12ecfcc8f780495d994e786f7d529646b824f27d1fbdcb3bdd8891d51b7752adc16d1165a7dcfaec9aa948abea1a931365f33736ce41c8d134a63b9b00000000000000", @ANYRES32=r2, @ANYBLOB="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"]) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x210082) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1001, 0x2008}) [ 1137.794351][ T7682] BPF:[1] FUNC_PROTO (anon) [ 1137.799009][ T7682] BPF:return=0 args=( [ 1137.804418][ T7682] BPF:0 [ 1137.807283][ T7682] BPF:, 7168 (anon) [ 1137.812354][ T7682] BPF:) [ 1137.815129][ T7682] BPF: [ 1137.817893][ T7682] BPF:Invalid arg#1 [ 1137.822920][ T7682] BPF: [ 1137.822920][ T7682] [ 1137.856307][ T7684] BPF:[1] FUNC_PROTO (anon) [ 1137.863320][ T7684] BPF:return=0 args=( [ 1137.867316][ T7684] BPF:0 [ 1137.871473][ T7684] BPF:, 7168 (anon) [ 1137.875651][ T7684] BPF:) [ 1137.878414][ T7684] BPF: [ 1137.882627][ T7684] BPF:Invalid arg#1 [ 1137.886435][ T7684] BPF: [ 1137.886435][ T7684] [ 1137.888782][ T7688] BPF:[1] FUNC_PROTO (anon) [ 1137.897104][ T7688] BPF:return=0 args=( [ 1137.902327][ T7688] BPF:67108864 (anon) [ 1137.906316][ T7688] BPF:, 0 [ 1137.909340][ T7688] BPF:, vararg [ 1137.914031][ T7688] BPF:) [ 1137.916811][ T7688] BPF: [ 1137.919575][ T7688] BPF:Invalid arg#1 [ 1137.924632][ T7688] BPF: [ 1137.924632][ T7688] [ 1137.942461][ T7689] BPF:[1] FUNC_PROTO (anon) [ 1137.947218][ T7689] BPF:return=0 args=( [ 1137.952630][ T7689] BPF:67108864 (anon) [ 1137.956620][ T7689] BPF:, 0 [ 1137.959647][ T7689] BPF:, vararg [ 1137.964334][ T7689] BPF:) [ 1137.967104][ T7689] BPF: [ 1137.969866][ T7689] BPF:Invalid arg#1 [ 1137.974979][ T7689] BPF: [ 1137.974979][ T7689] [ 1138.085975][ T7702] BPF:btf_header not found [ 1138.106848][ T7704] device vlan1350 entered promiscuous mode 01:13:35 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x1e00}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:35 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000600000018000000a46b12ecfcc8f780495d994e786f7d529646b824f27d1fbdcb3bdd8891d51b7752adc16d1165a7dcfaec9aa948abea1a931365f33736ce41c8d134a63b9b00000000000000", @ANYRES32=r2, @ANYBLOB="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"]) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x210082) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x4}) 01:13:35 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x5000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1138.242585][ T7702] BPF:btf_header not found [ 1138.377106][ T7715] BPF:[1] FUNC_PROTO (anon) [ 1138.383177][ T7715] BPF:return=0 args=( [ 1138.387375][ T7715] BPF:0 [ 1138.391645][ T7715] BPF:, 7680 (anon) [ 1138.395463][ T7715] BPF:) [ 1138.398226][ T7715] BPF: [ 1138.401069][ T7715] BPF:Invalid arg#1 [ 1138.404879][ T7715] BPF: [ 1138.404879][ T7715] [ 1138.417395][ T7718] BPF:[1] FUNC_PROTO (anon) [ 1138.423585][ T7718] BPF:return=0 args=( [ 1138.427573][ T7718] BPF:0 [ 1138.432028][ T7718] BPF:, 7680 (anon) [ 1138.435838][ T7718] BPF:) [ 1138.438598][ T7718] BPF: [ 1138.442870][ T7718] BPF:Invalid arg#1 [ 1138.446683][ T7718] BPF: [ 1138.446683][ T7718] 01:13:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x4000, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:36 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x1f00}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x20b000) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000002c0)={0x1, @win={{0x40, 0x0, 0x0, 0x9}, 0x5, 0x400, &(0x7f0000000200)={{0x3e8, 0x3, 0x80, 0x4}, &(0x7f00000001c0)={{0x8000, 0x7, 0x8000, 0x4}, &(0x7f0000000180)={{0x8, 0x0, 0x8, 0x7}}}}, 0x1, &(0x7f0000000240)="4b55c403e5b6a14060d188a6bafb689756524c62aa73ea1fecc6e764f8e23db115099638003ae668f06e0958449ca2b3942fa4771bd3dfd6be864465d33226ee183b6930318b6b3d44aef1b7f94b09ad76561dbcf40adefd197c395cb887e487515dcb8220c3470f8d5121227b15c82479", 0xff}}) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) r1 = syz_mount_image$sysv(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x3, 0x5, &(0x7f00000008c0)=[{&(0x7f0000000440)="b10284f26a528f62eba2b09bea70b74ea10c487548db5ac6ef3b76e8e2dbea1d326210aa319462ddfa1cdd10b2381e869a7f39f3823915cbaca0db8972e98826bd09f678475a4518bd75310b403dcafd7e5fb87a9c682350c118c130d2d7e721ca0cc6fea1b085d3447c56115c319adc726be5490a29c8b8bffe44673e35240e907f2a626a03fb338b10a0de6d0d7305127327efd24ad2de68c4f296172a23de6ca15ca14cd675cc022ae228e2432a8818fc28aa0e86449483a6c21cbf154a233a724973caee318bcfe30e76792665ff025e16a7d95c2d6461ad83661e4f8ba95a19943f48049a74e5dbf515949cb79d788945", 0xf3, 0x4db}, {&(0x7f0000000540)="89d502f52c250bda2e1a91a5b7e7065be3824850405ec50f10af2734cd4e4a7cc8aeb0c65cecdaa6d1dea784b0478080e2d3696b6657f7265132d49505dd568514b7f68e7e6f2777bc433d919b2164d399dc3396e7191df43bdfd08f6d172ecdd43584584ef126189f0f316aadd6ccd5ce30aa06e07e43062d423294a22013c961f3e5c91eb56373dfd88928fff6e62eea0c20ef6c4864a04bc6bd7b384031e34c5520fcda7e72eea3813ef0aa60e63b5d7cea11d0b372d360aff1252993d19dffa5df62168bedb93aa3a22f1e9daa7dc5869679ff752e2a6c2f915c5889c871e1bebc514fc0c01bc37b1a2b48", 0xed, 0x69}, {&(0x7f0000000640)="947a2f6c8be2ef3439b2364f4ccc1d0160707f781222a219e76e1477ee3d5e5d5697456b5e40976ee1516590f99f6efc52cfed0dc9a46e2a06d26150000d92de0d9eede06cf9a6d2c39549074d420ffbbccc", 0x52, 0x7}, {&(0x7f00000006c0)="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", 0xfa, 0x1289}, {&(0x7f00000007c0)="88ad9b5e1fd70a21b0f8c38335050754c643b2dab0de0ff333a3fb602257ddcf95dfe99420abd299c28b85ca4d35e9347c7a6a0be01aeaafb460169c7b2957c9640db1020a3ea0412cc838e603de750cd42a89f4e0c73c1f4b685c02aceaa7b24303d8cb9eb6f3f14adb1155a431a22271db6ebaea435ef12c7eb001eecd8427751bd682648bc8968e8e0451f61da53600acd374ef0b1b62975ab4c6ecc1c3835d07012bf8e31bf3e22f1a432b05e3abaeeb2d378c2c928e3e041a8621574b3df68166fe1ae121994996b51522bb227ed4e2804a8b57", 0xd6, 0x4}], 0x400, &(0x7f0000000940)=ANY=[@ANYBLOB='threaded\x00,memory.events\x00,obj_role=\',fowner>', @ANYRESDEC=0xee00, @ANYBLOB="2c7063723d30303030303030303030303030303030303033382c6673757569643d33383900616337352d353231622d393964612d333671612d6495b436323166302c7375626a5f757365723d7468726561646564002c66736d616769633d3025303030303030303030303030303030382c6f626a5f726f6c653d5d822c636f6e74655a743d73746166665f752c61707072616973655f747970653d696d617369672c646f6e745f61707072616973652c00"]) ioctl$int_in(r1, 0x5421, &(0x7f0000000a40)=0x3) [ 1138.553422][ T7723] BPF:[1] FUNC_PROTO (anon) [ 1138.558107][ T7723] BPF:return=0 args=( [ 1138.563523][ T7723] BPF:83886080 (anon) [ 1138.567524][ T7723] BPF:, 0 [ 1138.571994][ T7723] BPF:, vararg [ 1138.575373][ T7723] BPF:) [ 1138.578140][ T7723] BPF: [ 1138.582078][ T7723] BPF:Invalid arg#1 [ 1138.585895][ T7723] BPF: [ 1138.585895][ T7723] [ 1138.605445][ T7724] BPF:[1] FUNC_PROTO (anon) [ 1138.611276][ T7724] BPF:return=0 args=( [ 1138.615303][ T7724] BPF:83886080 (anon) [ 1138.619286][ T7724] BPF:, 0 [ 1138.623765][ T7724] BPF:, vararg [ 1138.627144][ T7724] BPF:) [ 1138.631220][ T7724] BPF: [ 1138.633992][ T7724] BPF:Invalid arg#1 [ 1138.637801][ T7724] BPF: [ 1138.637801][ T7724] [ 1138.712296][ T7732] BPF:[1] FUNC_PROTO (anon) [ 1138.716961][ T7732] BPF:return=0 args=( [ 1138.722247][ T7732] BPF:0 (anon) [ 1138.725637][ T7732] BPF:, 2 [ 1138.727755][ T7733] BPF:[1] FUNC_PROTO (anon) [ 1138.728655][ T7732] BPF:) [ 1138.728666][ T7732] BPF: [ 1138.728676][ T7732] BPF:Invalid arg#1 [ 1138.728686][ T7732] BPF: [ 1138.728686][ T7732] [ 1138.752749][ T7733] BPF:return=0 args=( [ 1138.756748][ T7733] BPF:0 [ 1138.759597][ T7733] BPF:, 7936 (anon) [ 1138.763959][ T7737] BPF:[1] FUNC_PROTO (anon) [ 1138.763976][ T7737] BPF:return=0 args=( [ 1138.763988][ T7737] BPF:0 (anon) [ 1138.764000][ T7737] BPF:, 2 [ 1138.764010][ T7737] BPF:) [ 1138.764019][ T7737] BPF: [ 1138.764030][ T7737] BPF:Invalid arg#1 [ 1138.764040][ T7737] BPF: [ 1138.764040][ T7737] [ 1138.797907][ T7733] BPF:) [ 1138.802281][ T7733] BPF: [ 1138.805061][ T7733] BPF:Invalid arg#1 [ 1138.808868][ T7733] BPF: [ 1138.808868][ T7733] 01:13:36 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x6000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:36 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x2000}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1138.853203][ T7735] BPF:[1] FUNC_PROTO (anon) [ 1138.857871][ T7735] BPF:return=0 args=( [ 1138.864208][ T7735] BPF:0 [ 1138.867079][ T7735] BPF:, 7936 (anon) [ 1138.872349][ T7735] BPF:) [ 1138.875127][ T7735] BPF: [ 1138.877912][ T7735] BPF:Invalid arg#1 [ 1138.883042][ T7735] BPF: [ 1138.883042][ T7735] [ 1138.949737][ T7743] device vlan1351 entered promiscuous mode [ 1139.009045][ T7752] BPF:[1] FUNC_PROTO (anon) [ 1139.015142][ T7752] BPF:return=0 args=( [ 1139.019149][ T7752] BPF:100663296 (anon) [ 1139.024342][ T7752] BPF:, 0 [ 1139.027383][ T7752] BPF:, vararg [ 1139.032029][ T7752] BPF:) [ 1139.034803][ T7752] BPF: [ 1139.037564][ T7752] BPF:Invalid arg#1 [ 1139.042846][ T7752] BPF: [ 1139.042846][ T7752] [ 1139.056369][ T7755] BPF:[1] FUNC_PROTO (anon) [ 1139.062216][ T7755] BPF:return=0 args=( [ 1139.066217][ T7755] BPF:100663296 (anon) [ 1139.071718][ T7755] BPF:, 0 [ 1139.074754][ T7755] BPF:, vararg [ 1139.078127][ T7755] BPF:) [ 1139.082145][ T7755] BPF: [ 1139.084912][ T7755] BPF:Invalid arg#1 [ 1139.088717][ T7755] BPF: [ 1139.088717][ T7755] 01:13:36 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000340)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f0000000440)={0x1, [0x4ae2, 0x1, 0x1, 0x400, 0x1000, 0xfff8, 0xfbff, 0x0, 0x0, 0x5, 0x3f, 0x7, 0x1, 0x2400, 0x3907, 0x6, 0x59, 0x9, 0x40, 0x7, 0x2, 0x2, 0x8, 0x8000, 0x6, 0x4, 0x10, 0x0, 0x8, 0x1, 0x1, 0x6, 0x20, 0x316, 0x6, 0x3c, 0x8, 0x6df8, 0x4, 0x1, 0x4800, 0xf66f, 0x91, 0x80, 0x101, 0x81, 0x4, 0x7], 0x1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000100)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000100)) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000400)={'syztnl0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x80, 0x8, 0x9, 0xffffffff, {{0x14, 0x4, 0x0, 0x7, 0x50, 0x66, 0x0, 0x7, 0x2f, 0x0, @rand_addr=0x64010100, @private=0xa010102, {[@timestamp_prespec={0x44, 0x4, 0x36, 0x3, 0xa}, @rr={0x7, 0x37, 0x8, [@loopback, @broadcast, @private=0xa010100, @multicast2, @broadcast, @broadcast, @local, @empty, @empty, @local, @multicast2, @dev={0xac, 0x14, 0x14, 0x43}, @remote]}]}}}}}) write$cgroup_type(r1, &(0x7f0000000000), 0x20b000) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000200)={0x2, {{0xa, 0x4e21, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x100b74}}, {{0xa, 0x4e21, 0x1f, @remote}}}, 0x108) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1139.169423][ T7760] BPF:[1] FUNC_PROTO (anon) [ 1139.175386][ T7760] BPF:return=0 args=( [ 1139.179386][ T7760] BPF:0 [ 1139.183386][ T7760] BPF:, 8192 (anon) [ 1139.187197][ T7760] BPF:) [ 1139.191336][ T7760] BPF: [ 1139.194112][ T7760] BPF:Invalid arg#1 [ 1139.197928][ T7760] BPF: [ 1139.197928][ T7760] [ 1139.214766][ T7761] BPF:[1] FUNC_PROTO (anon) 01:13:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x4800, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1139.219435][ T7761] BPF:return=0 args=( [ 1139.224601][ T7761] BPF:0 [ 1139.227461][ T7761] BPF:, 8192 (anon) [ 1139.233110][ T7761] BPF:) [ 1139.235894][ T7761] BPF: [ 1139.238681][ T7761] BPF:Invalid arg#1 [ 1139.243840][ T7761] BPF: [ 1139.243840][ T7761] 01:13:36 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x7000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) 01:13:36 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000600000018000000a46b12ecfcc8f780495d994e786f7d529646b824f27d1fbdcb3bdd8891d51b7752adc16d1165a7dcfaec9aa948abea1a931365f33736ce41c8d134a63b9b00000000000000", @ANYRES32=r2, @ANYBLOB="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"]) r3 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x210082) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x4}) [ 1139.325411][ T7767] BPF:[1] Invalid name_offset:2 [ 1139.366746][ T7769] BPF:[1] Invalid name_offset:2 01:13:36 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9fca010010000000000000001c000027b716b7a5a8730e021c0000000000000000000000ff18000000020009000000cd0bbf36addde90927f857615ffb5194ad0e65c9b1a802eb6fe922926edb6f690c367c6e902e946e5cde01f5aeb01170f55d3d5f86b48ab04d35e8c9534ba6c698dd3be86b81014aeb5eee2641256dd5d60c33267b15436ff9bb4aaed91f2187ffb7cf863c5f13dbc70ffcbb4e7b263cf8a4687f2046895a0e02243324e5dcc57357e3f9c1b8f9b32e8553ac8106026eef3571eb643dac53951a03f96e905610ebbe8f2a887fc054c159123911f8900e5035df16025fb530fb27006f87ee55"], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) clone(0x1000080, &(0x7f0000000180)="36854cf860bb87867f44a81518d81221853a2cea1e6d1c64d8b6d8aaec71e0663defa7dcbf9cf5518c007178d77cb3b550e603b091a6d66d945caa274458fca79772fc664840b166784638d33590e7f68b76c83ce7b5bbe93595dc5e0bf7deb1ef3082fb82c592bb3c966fcdebd865af179dd88d6b9632d70ded47044ad66959f17cb90450663d1ffedae2ec867d9055e3c868dd60d9813822dbb08a589410930b29481177d3c9046ada5a7c488c6974f07007d422c261eada635936cf987ffd95dd7af26e3751e7dd82897c9f5ccdca90ddaf7d8e8e45a5", &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="f2608a5a6b11a7eed2fa09b1370ff9162d2ca7def9a149959253f7ffeb3a156d105579b43e031e226d2206b3bc1f4066a0c826d7c9e6fe6bf952a1fb2ac491471507cb58649ab6bdb2042b45d25e70ea1bde99eaae80d5def823f17033c058ae105fd578519b37e91d0dd57caa2807a317ffeb9e6bddf0cb0f9abe5158787dfdc93855fe9e6052385c805c60670c1e2eeaf8ef6f25a01959aa9afffd0e16d84cb67c13f0d53fe452aa6c63428bad8a6902dc8b") 01:13:36 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x2e00}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1139.459416][ T7777] BPF:[1] FUNC_PROTO (anon) [ 1139.465369][ T7777] BPF:return=0 args=( [ 1139.469404][ T7777] BPF:117440512 (anon) [ 1139.474845][ T7777] BPF:, 0 [ 1139.477888][ T7777] BPF:, vararg [ 1139.482541][ T7777] BPF:) [ 1139.485319][ T7777] BPF: [ 1139.488085][ T7777] BPF:Invalid arg#1 [ 1139.492998][ T7777] BPF: [ 1139.492998][ T7777] [ 1139.518432][ T7778] BPF:[1] FUNC_PROTO (anon) [ 1139.520421][ T7779] device vlan1352 entered promiscuous mode [ 1139.524126][ T7778] BPF:return=0 args=( [ 1139.534126][ T7778] BPF:117440512 (anon) [ 1139.538208][ T7778] BPF:, 0 [ 1139.542530][ T7778] BPF:, vararg [ 1139.545909][ T7778] BPF:) [ 1139.548758][ T7778] BPF: [ 1139.552845][ T7778] BPF:Invalid arg#1 [ 1139.556670][ T7778] BPF: [ 1139.556670][ T7778] 01:13:37 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000600000018000000a46b12ecfcc8f780495d994e786f7d529646b824f27d1fbdcb3bdd8891d51b7752adc16d1165a7dcfaec9aa948abea1a931365f33736ce41c8d134a63b9b00000000000000", @ANYRES32=r2, @ANYBLOB="ffff8ae200005b002e2f66696c6530004040cd976d09e670516d510ad3e1e87e03af7f3156cc937ac91b95d401a519874fed66bfef23b19dabc7f6589342ce89574f38b3656e68c645bcaea00f4270dc17c11631547adda879521f3bc8d447480155a0529e9e7dbd5d543ba5c29dfd102a25e6a1bae3951264746cc6c90ca85ed5d4ae82f094687857fc5e3a1ed72cd7ca4154534626ff574519dd2af95758e22112c5019d36ff07000083f01ededbee118bdddbd599cb565dd423ae30a460018c11158fb9316700000000000000000000000000000000d1e5dc3dd64279ed722ac5462af1ca1d2f6ddc432338ec3006cb6aebad5074b6c11d297d43ef1e5568bc74c7b9311f1b439bd062a25919dd764b5cb631703a0326cb6e90255751fe9d6c08ffa6ec9e6e76f4507ed7a491242fe6aa317905de42599c1b2f79"]) syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x210082) 01:13:37 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x8000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1139.661915][ T7794] BPF:Invalid magic [ 1139.696741][ T7794] BPF:Invalid magic 01:13:37 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x400, 0x1003, 0x8}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000580)={0x0, 0xc4, 0x7f, 0x20203843, 0x0, [0x2], [0x800]}) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000240)=""/220, 0xdc}, {&(0x7f0000000340)=""/246, 0xf6}, {&(0x7f0000000440)=""/221, 0xdd}, {&(0x7f0000000540)=""/127, 0x7f}, {&(0x7f0000000000)=""/25, 0x19}, {&(0x7f00000005c0)=""/22, 0x16}, {&(0x7f0000000600)}, {&(0x7f0000000640)=""/218, 0xda}, {&(0x7f0000000740)=""/120, 0x78}], 0x9) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010618000000000000001c0000001c00000002000000000000000200000d00000000000000000000000001000000020000000000fe41c4273527c55df2b2d510e0864264b4fcf89fc8035d8036ef7acfce1c40ff0332f20a288c26733058629c3c6b80e4a898c419741be034e69e66a9d2bbee9f8b1fcd010f400b6ec3047ef55800beefffe44cf00716a67eb9b1800745220300878671fe8753b4b81042469cd80f3b884e43bd8e436334c6c2485c11beed262a35"], &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x4a00, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1139.828868][ T7802] BPF:[1] FUNC_PROTO (anon) [ 1139.834939][ T7802] BPF:return=0 args=( [ 1139.838972][ T7802] BPF:0 [ 1139.843002][ T7802] BPF:, 11776 (anon) [ 1139.846908][ T7802] BPF:) [ 1139.849675][ T7802] BPF: [ 1139.853613][ T7802] BPF:Invalid arg#1 [ 1139.857427][ T7802] BPF: [ 1139.857427][ T7802] [ 1139.897020][ T7804] BPF:[1] FUNC_PROTO (anon) [ 1139.904370][ T7804] BPF:return=0 args=( [ 1139.908401][ T7804] BPF:0 [ 1139.911316][ T7804] BPF:, 11776 (anon) [ 1139.915218][ T7804] BPF:) [ 1139.915794][ T7810] BPF:Unsupported flags [ 1139.917979][ T7804] BPF: [ 1139.917991][ T7804] BPF:Invalid arg#1 [ 1139.918000][ T7804] BPF: [ 1139.918000][ T7804] [ 1139.993589][ T7814] BPF:Unsupported flags 01:13:37 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000007c0)=ANY=[@ANYBLOB="010000000600000018000000a46b12ecfcc8f780495d994e786f7d529646b824f27d1fbdcb3bdd8891d51b7752adc16d1165a7dcfaec9aa948abea1a931365f33736ce41c8d134a63b9b00000000000000", @ANYRES32=r2, @ANYBLOB="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"]) 01:13:37 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x4800}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:37 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) clone(0x12000200, &(0x7f0000000180)="a10c37e53d7958ebd40dda9f24e41efbd7b43cb6967307a820442db43e9c19c9527b00833ac1833123d466525b68f015fa25b95428b4daf86ce889ebcb87120c86e9318886a810453a28e233f7d38d6f56", &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="3b25ac17caa5bb1bb5f97c4100a35a86145532e0830f0e50581b28a5b87c62d327690af41de454efc9a0d86942c45762a623721db16ae1bf15e652") [ 1140.073439][ T7820] BPF:[1] FUNC_PROTO (anon) [ 1140.078123][ T7820] BPF:return=0 args=( [ 1140.083459][ T7820] BPF:134217728 (anon) [ 1140.087547][ T7820] BPF:, 0 [ 1140.092003][ T7820] BPF:, vararg [ 1140.095387][ T7820] BPF:) [ 1140.098158][ T7820] BPF: [ 1140.102095][ T7820] BPF:Invalid arg#1 [ 1140.105912][ T7820] BPF: [ 1140.105912][ T7820] [ 1140.127190][ T7821] BPF:[1] FUNC_PROTO (anon) [ 1140.133273][ T7821] BPF:return=0 args=( [ 1140.137268][ T7821] BPF:134217728 (anon) [ 1140.142618][ T7821] BPF:, 0 [ 1140.145655][ T7821] BPF:, vararg [ 1140.149028][ T7821] BPF:) [ 1140.152980][ T7821] BPF: [ 1140.155754][ T7821] BPF:Invalid arg#1 [ 1140.159647][ T7821] BPF: [ 1140.159647][ T7821] 01:13:37 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) [ 1140.227478][ T7824] device vlan1353 entered promiscuous mode 01:13:37 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0xa000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1140.387147][ T7840] BPF:[1] FUNC_PROTO (anon) [ 1140.393193][ T7840] BPF:return=0 args=( [ 1140.397240][ T7840] BPF:0 [ 1140.400176][ T7840] BPF:, 18432 (anon) [ 1140.404074][ T7840] BPF:) [ 1140.406836][ T7840] BPF: [ 1140.409597][ T7840] BPF:Invalid arg#1 [ 1140.413494][ T7840] BPF: [ 1140.413494][ T7840] 01:13:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x4c00, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 01:13:38 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) [ 1140.451424][ T7841] BPF:[1] FUNC_PROTO (anon) [ 1140.456091][ T7841] BPF:return=0 args=( [ 1140.462768][ T7841] BPF:0 [ 1140.465640][ T7841] BPF:, 18432 (anon) [ 1140.469540][ T7841] BPF:) [ 1140.473475][ T7841] BPF: [ 1140.476256][ T7841] BPF:Invalid arg#1 [ 1140.481215][ T7841] BPF: [ 1140.481215][ T7841] [ 1140.527461][ T7849] BPF:[1] FUNC_PROTO (anon) [ 1140.533465][ T7849] BPF:return=0 args=( [ 1140.537864][ T7849] BPF:0 (anon) [ 1140.542567][ T7849] BPF:, 2 [ 1140.545601][ T7849] BPF:) [ 1140.548377][ T7849] BPF: [ 1140.551211][ T7849] BPF:Invalid arg#1 [ 1140.555021][ T7849] BPF: [ 1140.555021][ T7849] [ 1140.574644][ T7850] BPF:[1] FUNC_PROTO (anon) [ 1140.579306][ T7850] BPF:return=0 args=( [ 1140.585770][ T7850] BPF:0 (anon) [ 1140.589165][ T7850] BPF:, 2 [ 1140.592251][ T7850] BPF:) [ 1140.595124][ T7850] BPF: [ 1140.597886][ T7850] BPF:Invalid arg#1 [ 1140.601742][ T7850] BPF: [ 1140.601742][ T7850] 01:13:38 executing program 1: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0x0, 0x4c00}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) [ 1140.633728][ T7853] BPF:[1] FUNC_PROTO (anon) [ 1140.638578][ T7853] BPF:return=0 args=( [ 1140.643799][ T7853] BPF:167772160 (anon) [ 1140.647885][ T7853] BPF:, 0 [ 1140.650974][ T7853] BPF:, vararg [ 1140.654353][ T7853] BPF:) [ 1140.657118][ T7853] BPF: [ 1140.659927][ T7853] BPF:Invalid arg#1 [ 1140.663774][ T7853] BPF: [ 1140.663774][ T7853] 01:13:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) r3 = syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000006100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6769643df2e512c4e430060c50c35c1bbd10bc81b114f2f81fe5009e1a90b356f4be955d51fa99e030576a4d6a5d1b57f3a072d0ef8131a58bc7bdbc65a8267b4e39117ee8ec4b2f0723bb21887f45d5d89b946ad26f9d91e30ee32600e55b39ee1fb843fc4c529567517838dc37e803ef1bcb6d44a3bc95e0ebf15945", @ANYRESHEX=r2, @ANYRES64=r1]) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000040)='hfsplus\x00', 0x0, r3) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [], 0x0, "8bebeb894f74c3"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005abc0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000005adc0)={0x0, 0x0, "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", "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"}) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005cd80)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "07adf4c967778a"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005dd80)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}], 0x2, "cf18bafd511fb0"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000001640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r23}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r23}, {}, {}, {}, {}, {}, {0x0, r23}, {0x0, r23}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r21}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r22}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {r22}, {}, {}, {}, {}, {0x0, r23}], 0x0, "8bebeb894f74c3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054480)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r24}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r18}, {}, {}, {0x0, r19}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r23}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r20}], 0x4, "91e3a11f42bc17"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005cd80)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "07adf4c967778a"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005dd80)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r28}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r27}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r25}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r26}], 0x2, "cf18bafd511fb0"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r33}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r33}, {}, {}, {}, {}, {}, {0x0, r33}, {0x0, r33}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r31}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r30}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r32}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r29}, {}, {}, {}, {}, {}, {}, {}, {}, {r32}, {}, {}, {}, {}, {0x0, r33}], 0x0, "8bebeb894f74c3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005bdc0)={0x10000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {r5, r20}, {r31}], 0x8, "c4cdefe87359eb"}) link(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='./file0\x00') [ 1140.681822][ T7857] BPF:[1] FUNC_PROTO (anon) [ 1140.686437][ T7857] BPF:return=0 args=( [ 1140.691745][ T7857] BPF:167772160 (anon) [ 1140.695825][ T7857] BPF:, 0 [ 1140.698854][ T7857] BPF:, vararg [ 1140.703671][ T7857] BPF:) [ 1140.706447][ T7857] BPF: [ 1140.709212][ T7857] BPF:Invalid arg#1 [ 1140.714342][ T7857] BPF: [ 1140.714342][ T7857] 01:13:38 executing program 0: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x9, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x3ff, 0x2, 0x5}) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x2, 0x2, 0x7}) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/33, 0x20}], 0x2, 0x2, 0x7) 01:13:38 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1140.858335][ T7870] device vlan1354 entered promiscuous mode 01:13:38 executing program 4: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x11000000}, {0x1}, {}]}]}}, &(0x7f0000000040)=""/211, 0x3e, 0xd3, 0x8}, 0x20) [ 1140.947753][ T7878] hfsplus: unable to parse mount options [ 1140.963096][ T7876] BPF:[1] FUNC_PROTO (anon) [ 1140.967773][ T7876] BPF:return=0 args=( [ 1140.973342][ T7876] BPF:0 [ 1140.976221][ T7876] BPF:, 19456 (anon) [ 1140.981311][ T7876] BPF:) [ 1140.984091][ T7876] BPF: [ 1140.986858][ T7876] BPF:Invalid arg#1 [ 1140.992101][ T7876] BPF: [ 1140.992101][ T7876] 01:13:38 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x9280b100, &(0x7f0000000180)="094325617ba29485e1fa6a87d7e474e138dc2dbd355a65fa9dcb018ab139c3f301dcd6a413bea28ebc6107faa626852616bbf4cb988fd16a864685691d2780c3a244", &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="d7f8ab6c324f2da0dd553418e6795f9cc425d9acb4c48600f0ffa8f8a6b2cc0fd018d800d5e36cd61907f301332097138ab60360de") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000040)=""/211, 0x36, 0xd3, 0x8}, 0x20) 01:13:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000012c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x4c02, 0x0, 0x180}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 1141.415530][ T7896] BPF:[1] FUNC_PROTO (anon) [ 1141.422756][ T7896] BPF:return=0 args=( [ 1141.426800][ T7896] BPF:0 (anon) [ 1141.431542][ T7896] BPF:, 2 [ 1141.434570][ T7896] BPF:) [ 1141.437330][ T7896] BPF: [ 1141.441581][ T7896] BPF:Invalid arg#1 [ 1141.445387][ T7896] BPF: [ 1141.445387][ T7896] [ 1142.033368][ T7906] BPF:[1] FUNC_PROTO (anon) [ 1142.038061][ T7906] BPF:return=0 args=( [ 1142.043435][ T7906] BPF:285212672 (anon) [ 1142.047515][ T7906] BPF:, 0 [ 1142.051828][ T7906] BPF:, vararg [ 1142.055205][ T7906] BPF:) [ 1142.057964][ T7906] BPF: [ 1142.062010][ T7906] BPF:Invalid arg#1 [ 1142.065815][ T7906] BPF: [ 1142.065815][ T7906] [ 1142.095306][ T7907] BPF:[1] FUNC_PROTO (anon) [ 1142.102593][ T7907] BPF:return=0 args=( [ 1142.106582][ T7907] BPF:285212672 (anon) [ 1142.112886][ T7907] BPF:, 0 [ 1142.115916][ T7907] BPF:, vararg [ 1142.119282][ T7907] BPF:) [ 1142.122080][ T7907] BPF: [ 1142.124844][ T7907] BPF:Invalid arg#1 [ 1142.128646][ T7907] BPF: [ 1142.128646][ T7907] [ 1142.494420][ T7919] BPF:[1] FUNC_PROTO (anon) [ 1142.499128][ T7919] BPF:return=0 args=( [ 1142.504541][ T7919] BPF:0 [ 1142.507396][ T7919] BPF:, 24320 (anon) [ 1142.512710][ T7919] BPF:) [ 1142.515484][ T7919] BPF: [ 1142.518257][ T7919] BPF:Invalid arg#1 [ 1142.522099][ T7919] BPF: [ 1142.522099][ T7919] [ 1142.548532][ T7920] BPF:[1] FUNC_PROTO (anon) [ 1142.555710][ T7920] BPF:return=0 args=( [ 1142.561096][ T7920] BPF:0 [ 1142.563953][ T7920] BPF:, 24320 (anon) [ 1142.567840][ T7920] BPF:) [ 1142.572027][ T7920] BPF: [ 1142.574813][ T7920] BPF:Invalid arg#1 [ 1142.578730][ T7920] BPF: [ 1142.578730][ T7920] [ 1143.058650][ T7925] BPF:[1] FUNC_PROTO (anon) [ 1143.065642][ T7925] BPF:return=0 args=( [ 1143.071172][ T7925] BPF:520093696 (anon) [ 1143.075246][ T7925] BPF:, 0 [ 1143.078265][ T7925] BPF:, vararg [ 1143.083014][ T7925] BPF:) [ 1143.085778][ T7925] BPF: [ 1143.088544][ T7925] BPF:Invalid arg#1 [ 1143.093712][ T7925] BPF: [ 1143.093712][ T7925] [ 1143.126771][ T7926] BPF:[1] FUNC_PROTO (anon) [ 1143.133771][ T7926] BPF:return=0 args=( [ 1143.137773][ T7926] BPF:520093696 (anon) [ 1143.143351][ T7926] BPF:, 0 [ 1143.146380][ T7926] BPF:, vararg [ 1143.151596][ T7926] BPF:) [ 1143.154360][ T7926] BPF: [ 1143.157119][ T7926] BPF:Invalid arg#1 [ 1143.162274][ T7926] BPF: [ 1143.162274][ T7926] [ 1143.937746][ T7937] BPF:[1] FUNC_PROTO (anon) [ 1143.943744][ T7937] BPF:return=0 args=( [ 1143.947734][ T7937] BPF:536870912 (anon) [ 1143.953186][ T7937] BPF:, 0 [ 1143.956213][ T7937] BPF:, vararg [ 1143.960930][ T7937] BPF:) [ 1143.963697][ T7937] BPF: [ 1143.966489][ T7937] BPF:Invalid arg#1 [ 1143.971680][ T7937] BPF: [ 1143.971680][ T7937] [ 1144.334825][ T7944] BPF:[1] FUNC_PROTO (anon) [ 1144.341845][ T7944] BPF:return=0 args=( [ 1144.345836][ T7944] BPF:0 (invalid-name-offset) [ 1144.351904][ T7944] BPF:, 2 (invalid-name-offset) [ 1144.356754][ T7944] BPF:) [ 1144.360689][ T7944] BPF: [ 1144.363454][ T7944] BPF:Invalid arg#1 [ 1144.367262][ T7944] BPF: [ 1144.367262][ T7944] [ 1144.781594][ T7950] BPF:[1] FUNC_PROTO (anon) [ 1144.786260][ T7950] BPF:return=0 args=( [ 1144.792667][ T7950] BPF:0 [ 1144.795527][ T7950] BPF:, 24576 (anon) [ 1144.800883][ T7950] BPF:) [ 1144.803648][ T7950] BPF: [ 1144.806411][ T7950] BPF:Invalid arg#1 [ 1144.811374][ T7950] BPF: [ 1144.811374][ T7950] [ 1144.872970][ T7951] BPF:[1] FUNC_PROTO (anon) [ 1144.877625][ T7951] BPF:return=0 args=( [ 1144.883094][ T7951] BPF:0 [ 1144.885949][ T7951] BPF:, 24576 (anon) [ 1144.891313][ T7951] BPF:) [ 1144.894076][ T7951] BPF: [ 1144.896838][ T7951] BPF:Invalid arg#1 [ 1144.901953][ T7951] BPF: [ 1144.901953][ T7951] [ 1176.921047][ T1228] ieee802154 phy0 wpan0: encryption failed: -22 [ 1176.928703][ T1228] ieee802154 phy1 wpan1: encryption failed: -22 [ 1225.065768][ T2934] Bluetooth: hci0: command 0x0406 tx timeout [ 1238.345081][ T1228] ieee802154 phy0 wpan0: encryption failed: -22 [ 1238.351435][ T1228] ieee802154 phy1 wpan1: encryption failed: -22 [ 1246.011681][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 1246.018312][ C1] rcu: 1-....: (10499 ticks this GP) idle=be9/1/0x4000000000000000 softirq=106246/106246 fqs=3830 [ 1246.030242][ C1] (t=10500 jiffies g=202165 q=6775) [ 1246.035547][ C1] NMI backtrace for cpu 1 [ 1246.039880][ C1] CPU: 1 PID: 7886 Comm: syz-executor.5 Not tainted 5.15.0-next-20211104-syzkaller #0 [ 1246.049455][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1246.059516][ C1] Call Trace: [ 1246.062797][ C1] [ 1246.065651][ C1] dump_stack_lvl+0xcd/0x134 [ 1246.070263][ C1] nmi_cpu_backtrace.cold+0x47/0x144 [ 1246.075639][ C1] ? lapic_can_unplug_cpu+0x80/0x80 [ 1246.080893][ C1] nmi_trigger_cpumask_backtrace+0x1ae/0x220 [ 1246.086939][ C1] rcu_dump_cpu_stacks+0x25e/0x3f0 [ 1246.092085][ C1] rcu_sched_clock_irq.cold+0x9d/0x746 [ 1246.097595][ C1] ? memcpy+0x39/0x60 [ 1246.101645][ C1] ? memcpy+0x39/0x60 [ 1246.105656][ C1] ? rcutree_dead_cpu+0x30/0x30 [ 1246.110530][ C1] ? do_raw_spin_unlock+0x171/0x230 [ 1246.115751][ C1] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 1246.121599][ C1] update_process_times+0x16d/0x200 [ 1246.126867][ C1] tick_sched_handle+0x9b/0x180 [ 1246.131747][ C1] tick_sched_timer+0x1b0/0x2d0 [ 1246.136628][ C1] ? get_cpu_iowait_time_us+0x3f0/0x3f0 [ 1246.142223][ C1] __hrtimer_run_queues+0x1c0/0xe50 [ 1246.147461][ C1] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 1246.153467][ C1] ? ktime_get_update_offsets_now+0x3eb/0x5c0 [ 1246.159573][ C1] hrtimer_interrupt+0x31c/0x790 [ 1246.164556][ C1] __sysvec_apic_timer_interrupt+0x146/0x530 [ 1246.170598][ C1] sysvec_apic_timer_interrupt+0x40/0xc0 [ 1246.176260][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1246.182266][ C1] RIP: 0010:_raw_spin_unlock_irqrestore+0x38/0x70 [ 1246.188711][ C1] Code: 74 24 10 e8 da 62 0b f8 48 89 ef e8 22 d9 0b f8 81 e3 00 02 00 00 75 25 9c 58 f6 c4 02 75 2d 48 85 db 74 01 fb bf 01 00 00 00 23 a2 fe f7 65 8b 05 1c f7 b0 76 85 c0 74 0a 5b 5d c3 e8 20 98 [ 1246.208336][ C1] RSP: 0018:ffffc90000dc0c08 EFLAGS: 00000206 [ 1246.214439][ C1] RAX: 0000000000000002 RBX: 0000000000000200 RCX: 1ffffffff1ff6d3e [ 1246.222420][ C1] RDX: 0000000000000000 RSI: 0000000000000101 RDI: 0000000000000001 [ 1246.230578][ C1] RBP: ffff8880b9d28280 R08: 0000000000000001 R09: ffffffff8ff62adf [ 1246.238561][ C1] R10: 0000000000000001 R11: 0000000000000000 R12: 00000001000170e9 [ 1246.246541][ C1] R13: ffff8880b9d28280 R14: 0000000000000000 R15: 00000000ffffffff [ 1246.254546][ C1] __mod_timer+0x837/0xe30 [ 1246.258990][ C1] ? run_timer_softirq+0x1d0/0x1d0 [ 1246.264136][ C1] ? garp_request_leave+0x290/0x290 [ 1246.269350][ C1] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 1246.275613][ C1] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 1246.281960][ C1] ? prandom_u32+0x1fa/0x470 [ 1246.286630][ C1] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 1246.292895][ C1] ? garp_request_leave+0x290/0x290 [ 1246.298110][ C1] call_timer_fn+0x1a5/0x6b0 [ 1246.302804][ C1] ? add_timer_on+0x4a0/0x4a0 [ 1246.307511][ C1] ? garp_request_leave+0x290/0x290 [ 1246.312732][ C1] __run_timers.part.0+0x675/0xa20 [ 1246.317870][ C1] ? call_timer_fn+0x6b0/0x6b0 [ 1246.322650][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1246.328839][ C1] run_timer_softirq+0xb3/0x1d0 [ 1246.333705][ C1] __do_softirq+0x29b/0x9c2 [ 1246.338241][ C1] __irq_exit_rcu+0x123/0x180 [ 1246.343007][ C1] irq_exit_rcu+0x5/0x20 [ 1246.347273][ C1] sysvec_apic_timer_interrupt+0x93/0xc0 [ 1246.352922][ C1] [ 1246.355864][ C1] [ 1246.358800][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1246.364803][ C1] RIP: 0010:tomoyo_check_acl+0xc1/0x450 [ 1246.370364][ C1] Code: f5 97 da fd 48 8d 7b 18 48 89 f8 48 89 fa 48 c1 e8 03 83 e2 07 0f b6 04 28 38 d0 7f 08 84 c0 0f 85 f7 02 00 00 44 0f b6 73 18 <31> ff 44 89 f6 e8 a5 9b da fd 45 84 f6 0f 85 61 01 00 00 e8 b7 97 [ 1246.390086][ C1] RSP: 0018:ffffc90003467bf0 EFLAGS: 00000246 [ 1246.396179][ C1] RAX: 0000000000000000 RBX: ffff88806ff5c880 RCX: ffffc90017a41000 [ 1246.404163][ C1] RDX: 0000000000000000 RSI: ffffffff839d335b RDI: ffff88806ff5c898 [ 1246.412145][ C1] RBP: dffffc0000000000 R08: 0000000081f8943c R09: 0000000000000000 [ 1246.420130][ C1] R10: ffffffff839d3408 R11: 0000000000000000 R12: ffffc90003467cb8 [ 1246.428107][ C1] R13: ffff88801901b410 R14: 0000000000000000 R15: 0000000000000000 [ 1246.436097][ C1] ? tomoyo_check_acl+0x148/0x450 [ 1246.441148][ C1] ? tomoyo_check_acl+0x9b/0x450 [ 1246.446105][ C1] ? tomoyo_check_path2_acl+0x2f0/0x2f0 [ 1246.451675][ C1] tomoyo_path_number_perm+0x32a/0x590 [ 1246.457153][ C1] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1246.463018][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1246.469203][ C1] ? lockdep_hardirqs_on+0x79/0x100 [ 1246.474422][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1246.480607][ C1] ? __x64_sys_ioctl+0x97/0x200 [ 1246.485484][ C1] security_file_ioctl+0x50/0xb0 [ 1246.490451][ C1] __x64_sys_ioctl+0xb3/0x200 [ 1246.495151][ C1] do_syscall_64+0x35/0xb0 [ 1246.499601][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1246.505516][ C1] RIP: 0033:0x7f1ce559dae9 [ 1246.509942][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1246.529563][ C1] RSP: 002b:00007f1ce2af2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1246.537996][ C1] RAX: ffffffffffffffda RBX: 00007f1ce56b1020 RCX: 00007f1ce559dae9 [ 1246.545976][ C1] RDX: 0000000020001640 RSI: 0000000081f8943c RDI: 0000000000000006 [ 1246.553961][ C1] RBP: 00007f1ce55f7f25 R08: 0000000000000000 R09: 0000000000000000 [ 1246.561942][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1246.569933][ C1] R13: 00007ffcc94d55df R14: 00007f1ce2af2300 R15: 0000000000022000 [ 1246.577949][ C1]