penat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x6000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:09 executing program 3: socketpair(0x2, 0x3, 0x4, &(0x7f00000002c0)) 06:51:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) accept4$packet(r0, 0x0, 0x0, 0x0) 06:51:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x4, 0x5, 0x2, 0x9}, 0x40) 06:51:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x6000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:09 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x6, 0x5, 0x1, 0x40}, 0x40) 06:51:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000500)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}]}]}, 0x2c}}, 0x0) 06:51:09 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x408) [ 1271.652010][ T418] BPF:[1] Invalid name_offset:100663296 [ 1271.676363][ T424] BPF:[1] Invalid name_offset:100663296 [ 1271.694543][ T423] BPF:[1] Invalid name_offset:24576 06:51:09 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000040)='.\x00', 0x0, 0xffffffffffffff5a, 0x0, 0x0, 0x0) 06:51:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x7000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:09 executing program 0: r0 = openat$rtc(0xffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x40247007, &(0x7f0000000040)) [ 1271.731288][ T427] BPF:[1] Invalid name_offset:24576 06:51:09 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4}, 0x40) 06:51:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x6800, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:09 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x5452, &(0x7f0000000080)={0x0, 'veth1_to_team\x00'}) 06:51:09 executing program 5: r0 = openat$rtc(0xffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x4024700a, 0x0) [ 1271.795262][ T435] BPF:[1] Invalid name_offset:117440512 [ 1271.821337][ T439] BPF:[1] Invalid name_offset:117440512 06:51:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x8000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:09 executing program 3: syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)={[{@fat=@sys_immutable='sys_immutable'}]}) 06:51:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x2, 0x4, 0x1f00, 0x1ff, 0x500}, 0x40) [ 1271.911098][ T447] BPF:[1] Invalid name_offset:26624 06:51:09 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x804) 06:51:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000140)={r1, 0x1, 0x6, @random="b9719e1fa15b"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r1, 0x1, 0x6, @link_local}, 0x10) [ 1271.944106][ T453] BPF:[1] Invalid name_offset:26624 [ 1271.957654][ T452] BPF:[1] Invalid name_offset:134217728 [ 1271.982992][ T462] BPF:[1] Invalid name_offset:134217728 06:51:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x9000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1271.991378][ T455] FAT-fs (loop3): bogus number of reserved sectors [ 1272.000611][ T455] FAT-fs (loop3): Can't find a valid FAT filesystem 06:51:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x6c00, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:09 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@generic={0x2, "f0ff063f2537f515a54683efc1aa6dadfa1a4bedcb5d66a78f1000b8fede7159312a24d773aca7e4fa5d0c34bbf15f79814687fab98f5c29142e817c0af48ececb93fbfb9d140534244c5d58b44a84ada3aff9a96c7e7ff8b09bbf546e861a9cff0a5eaee16defaa568449e8fdde8fd660c4bd4345c3519c53a5b0c57dc4"}, 0x80, 0x0, 0x0, &(0x7f0000000140)=[{0xc, 0x101}, {0xc, 0x1}], 0x18}}], 0x1, 0x0) 06:51:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0xa000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1272.039273][ T467] BPF:[1] Invalid name_offset:150994944 [ 1272.050770][ T469] device batadv_slave_1 entered promiscuous mode [ 1272.058290][ T455] FAT-fs (loop3): bogus number of reserved sectors [ 1272.065467][ T472] BPF:[1] Invalid name_offset:150994944 [ 1272.074091][ T455] FAT-fs (loop3): Can't find a valid FAT filesystem 06:51:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x4, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0xe4]}, 0x40) [ 1272.099622][ T465] device batadv_slave_1 left promiscuous mode [ 1272.114509][ T477] BPF:[1] Invalid name_offset:27648 [ 1272.125910][ T475] device batadv_slave_1 entered promiscuous mode [ 1272.143746][ T480] BPF:[1] Invalid name_offset:27648 06:51:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f00000061c0)=[{{&(0x7f0000000480)=@in={0x2, 0x4e24, @multicast2}, 0x80, 0x0, 0x0, &(0x7f0000002940)=[@mark={{0x10}}], 0x10}}], 0x1, 0x0) [ 1272.147331][ T465] device batadv_slave_1 left promiscuous mode [ 1272.166958][ T483] BPF:[1] Invalid name_offset:167772160 [ 1272.181884][ T485] BPF:[1] Invalid name_offset:167772160 06:51:10 executing program 3: syz_mount_image$msdos(&(0x7f0000001280)='msdos\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, &(0x7f0000001700), 0x0, &(0x7f0000002d00)={[{@fat=@nfs='nfs'}]}) 06:51:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0xb000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x5, 0x5, 0x580d}, 0x40) 06:51:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x7400, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:10 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x4, 0x0, 0x2}, 0x40) 06:51:10 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x4, 0x6, 0x2, 0xc}, 0x40) [ 1272.276256][ T491] BPF:[1] Invalid name_offset:29696 [ 1272.303203][ T496] BPF:[1] Invalid name_offset:29696 06:51:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000200), 0x4) 06:51:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x7a00, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5411, &(0x7f0000000040)={'wlan1\x00'}) [ 1272.345885][ T502] FAT-fs (loop3): bogus number of reserved sectors [ 1272.349373][ T503] BPF:[1] Invalid name_offset:184549376 [ 1272.377535][ T502] FAT-fs (loop3): Can't find a valid FAT filesystem 06:51:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0xfffffffb, 0x4) [ 1272.417221][ T510] BPF:[1] Invalid name_offset:184549376 [ 1272.443773][ T502] FAT-fs (loop3): bogus number of reserved sectors [ 1272.459157][ T502] FAT-fs (loop3): Can't find a valid FAT filesystem 06:51:10 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x1, &(0x7f00000001c0)=@raw=[@func], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x48], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 06:51:10 executing program 1: mount$fuseblk(0x0, 0x0, 0x0, 0xba48f308ff5fbae, 0x0) [ 1272.461715][ T517] BPF:[1] Invalid name_offset:31232 [ 1272.484065][ T518] BPF:[1] Invalid name_offset:31232 06:51:10 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) 06:51:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0xc000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0xa000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:10 executing program 0: syz_io_uring_setup(0x2052, &(0x7f0000000400), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff1000/0x3000)=nil, 0x0, 0x0) syz_io_uring_setup(0x1ebe, &(0x7f0000000580), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000600), &(0x7f0000000640)) 06:51:10 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x16, &(0x7f0000002b80), 0x10) 06:51:10 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0xf, 0x0, 0x0) 06:51:10 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000840)={0x0, @qipcrtr, @sco, @ax25={0x3, @default}}) [ 1272.583390][ T530] BPF:[1] Invalid name_offset:40960 [ 1272.620440][ T535] BPF:[1] Invalid name_offset:201326592 [ 1272.628315][ T539] BPF:[1] Invalid name_offset:40960 06:51:10 executing program 1: rt_sigqueueinfo(0x0, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) 06:51:10 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x13}, 0x40) 06:51:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0x2c}}, 0x0) [ 1272.654998][ T535] BPF:[1] Invalid name_offset:201326592 06:51:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0xfffff, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0xd000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:10 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0x7, 0x5, 0x8001}, 0x8) 06:51:10 executing program 5: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x6}, 0x0) 06:51:10 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x25, &(0x7f0000000040)) 06:51:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x1000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1272.805564][ T556] BPF:[1] Invalid name_offset:1048575 [ 1272.813780][ T557] BPF:[1] Invalid name_offset:1048575 06:51:10 executing program 0: r0 = getpid() process_vm_readv(r0, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000040)=""/222, 0xde}], 0x2, &(0x7f0000001500)=[{&(0x7f0000000240)=""/82, 0x52}, {&(0x7f00000002c0)=""/181, 0xb5}, {0x0}], 0x3, 0x0) 06:51:10 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000004dc0), &(0x7f0000004e00)=0x4) [ 1272.852137][ T559] BPF:[1] Invalid name_offset:218103808 [ 1272.874614][ T562] BPF:[1] Invalid name_offset:218103808 [ 1272.890346][ T564] BPF:[1] Invalid name_offset:16777216 06:51:10 executing program 1: io_setup(0x7ff, &(0x7f0000000540)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) io_cancel(r0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:51:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0xe000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x2000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:10 executing program 0: keyctl$dh_compute(0x17, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)={'crc32\x00'}}) [ 1272.921448][ T568] BPF:[1] Invalid name_offset:16777216 [ 1272.944023][ T570] sctp: [Deprecated]: syz-executor.3 (pid 570) Use of int in maxseg socket option. [ 1272.944023][ T570] Use struct sctp_assoc_value instead 06:51:10 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc56feeb600c5b864) 06:51:10 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x890b, &(0x7f0000000080)) [ 1273.021965][ T577] BPF:[1] Invalid name_offset:234881024 [ 1273.032421][ T581] BPF:[1] Invalid name_offset:234881024 [ 1273.040986][ T578] BPF:[1] Invalid name_offset:33554432 06:51:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0xf000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1273.082718][ T584] BPF:[1] Invalid name_offset:33554432 [ 1273.139894][ T589] BPF:[1] Invalid name_offset:251658240 [ 1273.150121][ T590] BPF:[1] Invalid name_offset:251658240 06:51:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x1) 06:51:11 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x20142) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x20142) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, 0xffffffffffffffff) waitid$P_PIDFD(0x2, r2, 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000007c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0], 0x2}) sendmsg$SMC_PNETID_FLUSH(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, 0x0, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ipvlan1\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0xa6}, 0x800) 06:51:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x3000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000500), 0x8) 06:51:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x10000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:11 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDCTL_SYNTH_MEMAVL(r0, 0xc004510e, &(0x7f0000000040)) 06:51:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$GTP_CMD_NEWPDP(r0, 0x0, 0x0) [ 1273.737035][ T611] BPF:[1] Invalid name_offset:268435456 [ 1273.763052][ T615] BPF:[1] Invalid name_offset:268435456 [ 1273.765562][ T614] BPF:[1] Invalid name_offset:50331648 06:51:11 executing program 3: keyctl$dh_compute(0x17, &(0x7f0000000340), &(0x7f0000000380)=""/9, 0x9, &(0x7f0000001400)={0x0, &(0x7f0000000400)="3894c5bbe6aaafb19d754f2362a53e33a60d6772a651cdc834014c3c2a78999e98ebee7e55b79ff9c9b0fa15424854422e6ab02f6aae3eba889ecce86b0da9ac15", 0x41}) 06:51:11 executing program 5: process_vm_readv(0x0, &(0x7f0000000540)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, &(0x7f0000000800)=[{0x0}], 0x1, 0x0) 06:51:11 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x1, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000180)={0x0, "a7d21bf80029f311f35962f8578d1cf196c89e23b9e88b1dc3c23a35a08d5af49c1e83f899c5bf9edba54fb76a8018dc6ab2b6b6c998fee6fbd28d8b4db6237c", 0x28}, 0x48, 0xfffffffffffffffc) r1 = add_key$fscrypt_v1(&(0x7f0000002d00)='logon\x00', &(0x7f0000002d40)={'fscrypt:', @auto=[0x61, 0x66, 0x33, 0x64, 0x64, 0x62, 0x61, 0x39, 0x37, 0x4, 0x65, 0x33, 0x39, 0x61, 0x32, 0x35]}, &(0x7f0000002d80)={0x0, "8a946027df6ea299994f05ac03386654784bc43476c105399f0139e9ad2926af73d3aece0a06b3e71b69d7e1cb21c226cb2d39cc70e5e1b72d4c7a2679cfcf9c", 0x31}, 0x48, r0) keyctl$search(0xa, r0, &(0x7f0000002a00)='big_key\x00', &(0x7f0000002cc0)={'syz', 0x3}, r1) r2 = request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f00000000c0)='/dev/i2c-#\x00', r0) keyctl$clear(0x7, r0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000300)=@l2tp={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000002b00)=[{&(0x7f0000000380)=""/10, 0xa}, {&(0x7f00000003c0)=""/236, 0xec}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f0000001780)=""/216, 0xd8}, {&(0x7f0000001880)=""/178, 0xb2}, {&(0x7f0000001940)=""/4096, 0x1000}, {&(0x7f0000002bc0)=""/209, 0xe1}, {&(0x7f0000002a40)=""/185, 0xfffffffffffffeef}], 0x9, &(0x7f0000000640)=""/202, 0xda}, 0x100) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='rxrpc\x00', r3) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000002940)="b91a70b122f5a61d22c0833c73dd3503f50104111857b3749541d05c4477dd51850b63b1394874eea59429", 0x2b, r2) add_key$fscrypt_v1(&(0x7f0000002e00)='logon\x00', &(0x7f0000002e40)={'fscrypt:'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f00000000c0)='/dev/i2c-#\x00', 0x0) [ 1273.795859][ T621] BPF:[1] Invalid name_offset:50331648 06:51:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x11000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x4000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x140) faccessat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) 06:51:11 executing program 3: syz_open_dev$hiddev(&(0x7f0000000040)='/dev/usb/hiddev#\x00', 0x0, 0x402c2) 06:51:11 executing program 5: syz_open_dev$video4linux(&(0x7f0000003940)='/dev/v4l-subdev#\x00', 0x2, 0x0) [ 1273.944093][ T640] BPF:[1] Invalid name_offset:285212672 [ 1273.983073][ T647] BPF:[1] Invalid name_offset:285212672 06:51:11 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x23, &(0x7f0000002b80), 0x10) [ 1273.991117][ T642] BPF:[1] Invalid name_offset:67108864 06:51:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000007200)={0x0, 0x0, &(0x7f00000071c0)={&(0x7f0000007100)={0x14}, 0x14}}, 0x0) 06:51:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x12000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x890d, 0x0) [ 1274.042890][ T651] BPF:[1] Invalid name_offset:67108864 06:51:11 executing program 3: syz_open_dev$I2C(&(0x7f0000000080)='/dev/i2c-#\x00', 0x0, 0x0) 06:51:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x5000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:11 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x20142) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, 0x0) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, 0x0, 0x800) 06:51:11 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002980)) [ 1274.134218][ T659] BPF:[1] Invalid name_offset:301989888 [ 1274.171328][ T663] BPF:[1] Invalid name_offset:301989888 06:51:11 executing program 5: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) [ 1274.189895][ T665] BPF:[1] Invalid name_offset:83886080 [ 1274.207755][ T668] BPF:[1] Invalid name_offset:83886080 06:51:12 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b80)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 06:51:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x1e000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:12 executing program 1: pselect6(0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000440)={&(0x7f0000000400)={[0x3ff]}, 0x8}) 06:51:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x6000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:12 executing program 0: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100000001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 06:51:12 executing program 5: io_setup(0x800, &(0x7f0000000180)) io_setup(0x0, &(0x7f0000000180)) 06:51:12 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0xc0189436, &(0x7f0000000080)) 06:51:12 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) recvmmsg(r0, &(0x7f0000007c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2001, 0x0) [ 1274.342710][ T682] BPF:[1] Invalid name_offset:503316480 [ 1274.376825][ T686] BPF:[1] Invalid name_offset:503316480 06:51:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x7000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, 0x0) 06:51:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x20000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1274.398151][ T685] BPF:[1] Invalid name_offset:100663296 [ 1274.422690][ T692] BPF:[1] Invalid name_offset:100663296 06:51:12 executing program 1: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001600)={'team0\x00'}) [ 1274.511519][ T697] BPF:[1] Invalid name_offset:117440512 [ 1274.529500][ T699] BPF:[1] Invalid name_offset:536870912 06:51:12 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x1001, 0x0, 0x0, "8373134184e7876bfc3bda49d5392779", "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"}, 0x1001, 0x0) 06:51:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x541b, 0x0) 06:51:12 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000001340)=[{&(0x7f0000000000)=""/240, 0xf0}], 0x1, &(0x7f0000002500)=[{&(0x7f00000013c0)=""/197, 0xc5}, {0x0}], 0x2, 0x0) 06:51:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x8000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1274.557424][ T702] BPF:[1] Invalid name_offset:117440512 [ 1274.593806][ T703] BPF:[1] Invalid name_offset:536870912 06:51:12 executing program 5: openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x4200, 0x0) 06:51:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 06:51:12 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x218000, 0x0) 06:51:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x25000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000200), &(0x7f0000000240)=0x8) [ 1274.717504][ T714] BPF:[1] Invalid name_offset:134217728 06:51:12 executing program 5: r0 = gettid() migrate_pages(r0, 0x0, 0x0, 0x0) 06:51:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x9000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x50600, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendmmsg$sock(r1, &(0x7f0000002700)=[{{&(0x7f0000000080)=@sco={0x1f, @fixed={[], 0x10}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000100)="13dc305b902a5745556697025927e415e36b5e33d1bfcf19a94a0859ba2f379e17bc885f36959659bd90ace2d599b4ddcc0ed55a94232958e594d317f17b8fc5794dc9e4e54ea4049e9350048133cc1961696bec5e0968c07c38f999cb4cec50c6141c04ee944f8b56fe5fc930e26b11d558f5e569fc7bd4f19a6d98e81b4126eaf2bb3431b4ad35d31c04ff38d08b0d718e4f046dc06104e4c46eb8aec6952bcdd3706c4cb5eca2a36054de000d1a215feaeea41e", 0xb5}], 0x1, &(0x7f0000000200)}}, {{&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x0, 0x5, 0x2, 0x5, "0a5b152d98b1a8919860b9040dc996ed6627309e032c673d49dd47541a07686f4a7d18d9036b5f2e29e34a934ab8caa4a10b4ea9816b0b8d6b5658e0b336ce", 0x1}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000002c0)="8dd642f85118589540586329829331f43fe3bb0bc30c29657b342e921e1fd3cbde6b74746ede04d8b58f5d809d6c04649388dc2109ba989eb89121ef48daeb8ccdcfd57dec774b8deb375af624c5e705fcad8e7f7eff3717d6d38b1fa76462998529d19499e760185253d65ff1c231160ad3252e53b3db0c30e399860538a7057dd7a8ccbaff5ccdabbde32f2270d7cf6c2f70bb1647890f3e2327cfdec3e055561b9f31091a899e3ffc92e6fbe01376c799ce1ec5ef4a71", 0xb8}, {&(0x7f0000000380)="558fed93606e14e4affca792de8c23cb6da55da3334081513dc8d97b0bcd42bbf415ec", 0x23}, {&(0x7f00000003c0)="8f2668aec1fee1d908828a64947ffa92feb9f48b69350ce8d0323d5daf54651a4e85add8d52c461f71e0a0689896f823d4390d2d94dcbab9f7435e650fd898c473ebd94c513c62c84618e6716b68b27976409ae0f64cbd83f6ed1293799c5ff4bee022766f529af7df7537d2b4391e5e8d9eee26367fa5471b6ef80de04e473b9244e73d0fab1aec708769ebb53abd2da8522a792eba780acde29bd83e8c16fc58782acde704e08e63afb3e76ea39463863f6848f3f9f699f7a933f5368ddbbe007ffb1115a7533f218f38a437b8c6bf52977422a38821875a3db9d0ed9c48a87c4703f1e2f349aad39330c61d3c97ce", 0xf0}], 0x3, &(0x7f0000000500)=[@mark={{0x14, 0x1, 0x24, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x40}}, @timestamping={{0x14, 0x1, 0x25, 0xd1f}}, @mark={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x80}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x3698}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}], 0xf0}}, {{&(0x7f0000000600)=@in={0x2, 0x4e20, @multicast2}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000680)="3ecb980821f74021a6ba29df0033bd68f22654a7c1f770fb3104b6217d1d184be98977b7c91161446a732cd32ee1dbf5b8ab051d7add25f86e016dc6f5a085f0077fccbffeaa44f08c3ed58d2bf69d07f46774274e1b03a589bf811828a21dc1", 0x60}], 0x1}}, {{&(0x7f0000000740)=@pppoe={0x18, 0x0, {0x4, @link_local, 'dummy0\x00'}}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000007c0)="f88dd3fb716338042be09480e52df3edcef9dd3b8a894c80fefb492c7e26cb41379d07d03def91e6305b83bbda745db92e7b0104a61bceab9bb7cdee232c435998696d23ba6f77fb30e9f08ec0087082db67", 0x52}, {&(0x7f0000000840)="3ff0b1843c6a376c7e34aa3ca0345531ef3a29747ac4d6fcd298dbf9f5125a2877f13e2d229d99a61eb125fa30a1138ae648d7558855e4fa01ba", 0x3a}, {&(0x7f0000000880)="fda1e5e1e14e033abad7664bdceb560dd637196e269b6b2af0072daf4481d490b0fe48203711a4b51e966088fc4ebff3bed84721b38fb3cae4f1248f5a7e8e9005fa909b2eadb384e33986b74209aa0064d6990016d0ea5830c93d6d66017410f271fa8f693cfdb7553b8b67f67ae1f8a53d97de7ffbf0f137ff7e9ce7e725adc6f259fe02272b625f3ac7009cecfbaf4725761ccd34be0da66319efae34", 0x9e}, {&(0x7f0000000940)="c4fee642bb605f16fbc6a857f9926d081700fe94f87883bbad7d86dcf641070d028741aee04423e2e627b8b2a47812f5ed063bbeebc399e4bd778e0e6c4f7358fa148386ae4c1802e65e571051ace7915a02a5bff4300f15e64379b1e2ec186d38e2b95c326b159ea0714dbab158286c0d20db4fd52f2b6814e441a9b93f55e8aad212da86d6a4e7c70d23ae5981b7f18e2168886a64cb58332431f33f5c720f903c6f7a9452ba39c2dfd5999ad8fc36658aa1d68fec7e1dec5b7df863af652944d7cdbd7fc210acd88b35dd623279c714ee17a8b52687", 0xd7}, {&(0x7f0000000a40)="9cc83ae5", 0x4}, {&(0x7f0000000a80)="6b79b974b39bf655795cc2e056271a8de7fa84f22faa2e1f3972458c793984d5506dbad5282582cdb134f253bdec6df0eda00303c4dd6687042df6d6016f1028b6d97815dedd09771f2dd9d58414027e65c045dac0d9a3c7131ba5809d564e807653bbbde60cc662e443cf4509564496eaa56ab709d0d3dd", 0x78}], 0x6, &(0x7f0000000b80)=[@timestamping={{0x14, 0x1, 0x25, 0xffffd3ec}}, @timestamping={{0x14, 0x1, 0x25, 0x955}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x48}}, {{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000c00)="a9e1d096196a71a64c108dd3129963d49318ebe55974aa199a0c3c4e019b7be499a5ffa84f9312190512a7b58d0265ff51d657ee70fd869a778546cf1da79e33c399f34938d69d1b476bf0d9c9a656833737694e70859c43b2fd6929a9b317", 0x5f}, {&(0x7f0000000c80)="b6b2f2e3770f3425294c6b441e8f9401eb882ea42e6d9a1f086d3f988c1be4d3da50715c21ab2816a8377712e4b4d77b7bef8dde101ed6673da42d58eec03b17366764b05e687f57dd01ba1918f2eefaa7d8cfa6aca80636d4680715dd87140714ff824b075c7d68e7703c20136bc8af08a130e57bc59c44877aca8d6fdf519278fc32e11a427d2c61ca161fcb9a85b2b4a3acd6c5ed360bc9c8de67ab7bc0ef7e1552595cc2695639f9b0fe42cb175b8548a80f5877e10bfc506df657db63a1853a59b26fbe9d21ba89660381d93ca9", 0xd0}, {&(0x7f0000000d80)="e1ee14bec407d7c4a3e9a87803b94306dd366853d3b7b2e5bb480f817d4b4b71a4e3bdf796411f0432bb3bc4e0f1a9a458306e558c8440ce917a24fe362a376ae3729978bd908e17c47843c0884148fa3e346add14b45a27785a6cf07e6eb34ca7c2ab4dfea594b695fe3f32cfde2b54b622e7ec93e600b5da307af5197969e02bc44d7f270d0388e9261d8eb7348c", 0x8f}, {&(0x7f0000000e40)="1821c0ab8804fd6b56e3d6e86b269dd8ee57025a171b6b3f4cdd0d3c81da", 0x1e}, {&(0x7f0000000e80)="325719af9f4d5a211444e636e89fd107e2802f25a87da7d0c77c88b512bdfe7cc6af20a7a6e7dfcba89ac5022a55d8c282ae31fad254c656e7bddc239ff78fcfcb9dc8e35d33593c1e32e68e909d495a6407d8c4593ae1dd944de8c5597b1965e40e1fb3d5c2dcfc304c4e059d4105dec10861d20e891af1f1521464b6e24b30ce846a53b967064e53b0c64b1d4e71ca7a92db85db497614cafdde79cb7cfc77ac1f721d907cc3ca191876b14681d8acf024e4d102c6ac1d06e3c7a78ae9c309173dd76f3b0d1836779b1d4f", 0xcc}, {&(0x7f0000000f80)="d4e555bd8fb3cdb5b94aaccb6c4d583bf973a8747847a678bb1e7a3f63305b62b837292eea2091184f2abe275ac748480104ff3ad229ff2016c859fdc95febd3903370fc47088e0d95394aab4be64707515fbf81ea3fc06f95ca6f55575bbf6505b39b1827bd836ff3d3bd99474d31b1562a6a1f6e1ae5c08e06ef5e0c091abc2c1353179370cd12aacf962f1870abdfc686c5d2efe325d4678f49f1959b1f685070aed7fd1b803e9cecae61a05efa036e35fb0111d05155324d779abc730f5a2d3ccad5d84a11426aefd8ea1ffd8d0d0eeb351b41885d22b2bdc2a86e5bba91bb3cb3f637c079253bced35b7d8f7de92c7fa7d6ca8c4ad52e", 0xf9}, {&(0x7f0000001080)="394c6da7baa0595ddca1f648dd166844c1a7e15f4f6169958b212ef2b3ef74e4364fbff1b3b603378b3cbfe939435f", 0x2f}, {&(0x7f00000010c0)="65c63fcdeb8456637bfd08ce987274028af49500aa94f167283e52e6a785518082d3bf241970b121390802afb3b48b76aa9487786cc20ad365defe4cfffc824c7ad787c65e241c2528da53cabb28c0e4261f095885813ad959329e9c437139c1c4e7ef832c02b7e0cbee27efb5cc18b841b2c246b6eb7a6c8bf59ce317ff03539a9c2fff91557de4fa4be636b1b08bf536bc861d67f5d46696a83cef299b39b402", 0xa1}, {&(0x7f0000001180)="05ad330ca34d619dd6677bbd46e77216c4f9757c6a3ab700a68802e9742076ca5b67ccfa9d7655871cd8f9be945bab35e079e453a73cc780b0b6e51b979e753f0bac1644a8449c8dddb3621019acdae23cee70d59742bcb1cdeeb0b24c369dd22921c708ff8a0352ba1009bb7a12b663b1bc871c109904eb9540fc5dc5940bd3d71acffe805eb6ee04f636427a56b814e2a9247fd7f253af7a1f01e3b1a30730ede40ab04c20fc788c622ddeaf330eb1f54945ad3e780412f215f0082d2824089257ab3af970faf7990d", 0xca}], 0x9, &(0x7f0000001340)=[@timestamping={{0x14, 0x1, 0x25, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x101}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x400}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x5}}], 0x90}}, {{&(0x7f0000001400)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f00000025c0)=[{&(0x7f0000001480)="e6f03dd50fb92725ae2c4e36a454702ff278e2981e001f4e1cf8cceed7269d0d6d37e9b3dd9a51d1c900f13b242152c49024a158824c38396303e9bc36f3c20391a737f24a36a9d9893e1b6d29f576c4db3f15e3f7278712347478fdb1ef1e28980ffe7e77cdf749007f5a3b496a43087251c960e2412e3b58d6ae38a086a5a6925d3a7b49d2f23e35551bce", 0x8c}, {&(0x7f0000001540)="80346430b4bbc5475d751f33c59e17a1c9b821aa6eca52718ae1c893b06fc0d5645a0b677920ca9a86645c3bc60493a5ef01fa354badc0ab47469d8466177afcc228cf9c84bfd3794c56a17dea8d52f7557934cf3195454ef00fdb2625775df3480b7d44d2749019d96dbf09bbbcd59a3f67aeef34df3bdba7b9dacc90de25dcb0e56b7178ae69ecc5c1f29d87f7683b5fb21e7b9979e9ef463dd2c5e4a718d95f542423631f688feeb5e1fff48ebebd82c4227a1f3d7d981f7014b474b26daf4821f89c0b59e1dee6c8b3da55212cd39c8fe0ed48ef9a75e8af0adcf3baf8d6903f5c0873fbe107af49a6075c25be8abad2cdb9955b7fb884c374aea7f734e250db73d71fcff00eb9bee50b00ea23087ac0401147f8640ae3eb53d295d6b7c47bacf5101a4361952e3bafb64463bcf77337832c2f8120549dd81f6d45817ea55b53b2b7bd68bd5aaf33dbdd80c4dd0e089600e96c823f322f3b5a98b32c07a9b0695cdef4b16c37a2a08afa27092801fb78f8624f83c1b01652f922379a6b08a9f05cf835e11db3e0b9abf0bc980b4d01b977c31db2a8dae7bd5aff6dac8dbd56bf329387df674a17b7d7d2784367abebe01cc54d9ffb894ffaee515ab7475f0d4edcdb8d20916bb7c3400eb23159f996395eceacc580078c1217e97ea9915bc51571790b480ee891e07cf9b41a570544c72810e60d4cb3d1af3be12b7e78821bde74263ce293b91b87ac31e59ab93873f71365225579c998f8d95235f560e8e3bad524086f7f773e5864508485f4e05c8aaa7387e83bab95ae95eb00aea7c46ac401e40f70b05cad7486570dcb262437b98d2e008f5afc8f044eaa69eac95d436cc7b4a531c99da84e6e2036cbced162d213cba84622f7196a343b69e8de8d5c06e07183191d4814728ebf26ca3f5b09a326a8a5f68d64fa7e3e12083694cd75d055fc82f02bf530893a458cc0a4e2378a8f6428cc2d585af2defd4ad637afb66925ef39ddb8d5f60f04a90d305187c6bc3e10bac9fc3925918fd0ecd80e0adf01aad77d15b146c87faf9ee1e7e5f10ee4900bf2f538552563a660a1ccf3b75968ea8c304e9d3b68b3af3070ea3bfa473d589363ba7ab329303c21e4524a025a6c941ebf04335f924bd22e7361c9fc77c4a71d14a3e568274934570b7c5b841fb9931d6f69f0eaf53bb5f210be396196387e973f8e28341f21222e4e42ad7700aa91acfef19e14ba74104e948df2441e837e0fac093cad89fb2104f6ee8f497d57e22e0e0adb5133c821789e25e051c5df320ff3a36eba2034dfd341a5709baebc5be41063503c97d55cbed6e5459c6376b9c27ec2235b308b21ed71946a544c946883169503d0f8e4ed050673d83228aecb7472fb8ece28ef313b447939fa7823b473f1d87dddf3d0814c68f7250fc356c4c78925ef9803237e1d4b6ea53bb0417718ea5a3f4f0dfd361ea40877de98762d382b2cd7ec3556040ae7b74a49492319e6b4f5263177693eef523e4ce03bb83a40e3400bc072a93451d805bd8e11e83db366238b7648a343e87263829f4c48ca792abc1cc19a301de170894154400b5ebb79d34743bccc5308c9087b216f1310b40278bb360c94c64544f475d6fef3a7877e2c807a05ed4ba589ebceecd427cb6a164ab571ffc8b4212646ea4a16c6c34180a3ff1b2fa78bed9f68caa8553ceb5c736a5fdf41e580c6a8a04388092b2a5ef4485fcba99fac58b94065cd26605f11c9388d1d3a2c2056eee5013438091f4e8e8f43a341b6af580683d5439e9ecb5a697e3c775c31e28983fdc59bdf195247b8b51b20223d680bdeef50ddc63fa6a0e418b29942ebfb81f5dcb82e47bd656716e401cdfc3a00113a393e11058733d3afb12e4bc207392ac760482be2e68fb7569486d43f21481538bef6cb73a2f330a89e78b1daef04e4b5651adc0837d4fac8c7f784744a608dccac838892999fc175f3867173f8ed375b140ad58d0332d0b836d84d81dfc33aa70ef0ec9ba510bc2a6494a8c43a455622e470eda568443ad30734abacb4bbc4e060a78182955d03d0a8d71f3d51d6d92f4de0ca53e6e9ea4d127e1a54513414539be4610c883ad76730f6e9c6caa3a346498ae324088e6e1ba58ac0e65ba4bf7cce36c6136b1812f2fc4a64d7218af1fd771f8300f982dbbeb9bbd34db8f0b96fc899291198dbd109dc104cac432bda9f48449d712fc2bc35e8e8aa7e2ff002f4cd0ee1dc1332d763a4b329bd2e75448b7434b635bafa25ab2d8f221b4453a222ec700b82a7ae19dd452d8af7be3e9384defaa70deabade8ae8ee85af110da8ed2d44b252366f00269fb42ddb7954484417f5ccabab7f54b79b25fedbb2e74075a7f5468ec8431511c4f74af7b6309c3f649d01d5d95876dfb6dadd4b0723b7b9a484bc3670e16ff6f0c9cfdbc9962b4d21b4e78ce150d7d618ec93eb915a9fe1aa6e4fde649aeb6308488baf1a977908c972e254b30fb903e8abfbd612702d8e14355e0aef73a5b8d11689899a7dcb0566184d8dd7ad98b6f217790c620e2a59c71f74bfeb56f6461e99fcb9cd7e9859b250a3543cf7cf1a69a7baeb589be51a05156afdd1408cf5c20523d69f86dfe7f50147eafc61c066a647f4e06d877cc860b7d355001564a4e8a4eb54feced79fe7884f24d5ee67cef9664fc75fc91c83d5bbc0e7b38b9ff73c823070aa920384a55b8c70b79e86e4286db167db8b8f828228fb54de7f2f05e6e6e80515dcaea0bed3d72d1d809aaa9798376c40cb695a363010a3c90901145768b5cc4febd81dd4808df40a6aa937ed743d193c5663d7d1aa47812ba3c5ca5d8a608cd8c9b5b3ec7ffc53103453213b56ca6a72553f87f9b50d88646f3a1d97916f361c699212fe02dbc74f2a46aced7cc33e445e5d2bade79be2ebda7d418d1155cbe23b3d773992725aa9d6a308c538ed4eede1d2333d145c2b8e135f0010526e848ffbe12ea4e83a738c3f5c317f83ec7e7b5e02ad1ebb15b3030f54bcb10a1f156b5e84f3e7e4b7cdd8dcd31d5fbcf2a444b73d9f39109ae800a7f843df451293f3396865c7722cf0aa70c087dfe7016061ad86d09387389fa28f012a97522bdfdd201603b6395db64e042b5c9508022c58b7fe9b11c9567fdb375ddfd8218ff5aad4504754de3dfb5ea794e902dc18c7daf8d9066286d2c3630a9149ec1b50b76e849b7acc9e55f2007f5a60f05b651373193e5da8320dc59726451719864d809a0e95a324fa8be6e0db4ff0f874dc7759d4233796bb384ba8bf213676bc588cd46fac7fe094737c32c2b1962e21fde625821de8e68971d6f59439ac5150e808e667ea9ba52068103b471648ab0c2980f5bc89f66403f22ae631f82e48080c86fc466369c66c49ed609bc546d42a17812395b74c135ba4a323ce23f1b65c75bf22dc11f0f0dd64d6dfd0c161eb99316a2fd8546e7b326ffd313666838d02bda0e740947cd2da71340162f6a7728c32986659e877bb898e5ecbb2a81301815d00fb2f57e62460ee2b6e4206564628e9efbec757250215c5f186fd9fd16c334dc35add7d7e62eff78a61eaefbab69d822b42fd061ea3c8f234722f854047d8607aef22b9fd30805f2b4531d0ddaf50f28e4c0469cbd4359e54efe2efa659ad402c6332f1f7b723af43b652f60fabb3d594e338467e2927169f1ff88d0e208fadd6afdb350968e3dc820b48b675021bba5a5d25eee350b3a8cd807564aed91b4245ea87ce88f83fca42542ddee6ab0b4650e559711050614e34c8dedd52582af5f9bd610df1df86b64d79c7d7e82aa4aa63a1f4104f044d09f3e93ed0d2b45a1ec0661107f956b6a6fb3d8e68e507798138fee9eeb338e88d7443561fa7b291a29ef6eb4dd05b7257663b9ed008d0f325a1b838cf91f6be48efd36686e59c58bbdd29272d1f972f056f6247847fb86d94ae70e1ae10069a8e991a6214870ce17c5f4c5901bd57017e41389d8c1b494905b932eebecbc686ff3b63a310a8ff3f459d629c4bbdaa1130fcfc84ccf28371751a243c38547e8ae7134d479ce22afc6b44197eb3131d7e1a161f7a597d6985a221efee38de3c75a873a8515fcffb509c5569f2c913dedc9989a8d0665c22b5929b190dbf6543318b7301756454a303981bbf92d851a5c4de81f679740c7456101b7cda49f37b505dace1b373283812ac91cb8c90b66f6c5e443a00867bdededb137df0076bfc49e08d2d36bcb1ee13007d7f6253b41f81d6ee10089df4d2ca13c533ae38602cff167a355e90876446b2477ec928bf6e5b9428bf94c8727fcdc3ebb67d95a952072d36a6c8cb1281760d7bef055d81eb77cf90fb100a86143f7ae3b935d0bd47e55f49f4e1b18d9ca64a00e989d5e22bb5b26e7e69f957d1e82f0465b9c14ed26f03b6f99b553826d134cff8a1bb9b43751548fd3d025280ac28ad42209d56dc10b38c46a5baa055ca009243a9eb695f9ca1eea4792e0f1feddee859d2be9d487d30896b9877bf0a62e1f6cd0b047689f37441c6f884100879987c5406100279bb64fe798387959b212cc0f6b2e4b1d757d268f498287644f36d09b6b96fe069183adfb99fae5f962024c59b4c7800abc78b35bb0c1d67bc3563e5d7f072a4166db59eccee5bf51ec7c4d02740a017e7e24d90420c46bb2b0fa9543c8e192c0d774f7e678f677dcc9d8d29fdbd77ec5ff8026ac40faed28c03ae0c65ddb8956979ec13e61bb8bd18b6dd70ce06052c309e4c9ae8c5e98180c1470338b81acca074a485d4044f95b08dc6582b92d9597dd8df66fe7e1a0da5ba80a4b0a6b2c136d20e2fab11c50e34fd0c740643def4575a51ec2ad2c004ea5b8332810274b2f05fd70491b5222d4e658a4085a59069af797a2c0d388afa30807d0633065f83017106c28962dbaf0c73bdb2fa07192d8093d28378d201f11b3e431caf2f9020277fca7bba546823c6e048d7fc80cd4ebd02a1e2af20fcd11529bc3dd25ab1bc31363a8cab1f61c06b55512277b0421869f5efac1841facf4c2fe340ab70341b68448e2f43b5357fced7a075e0cc4588996bbb8a7fee0a455ba7b10a1904297335408630a181c09de58c812d6eb892d7163f67fd1c830f8a872b7b101e0667312c461981f9784c4ec83309c5cc61788827359c631a9d77ce6273787cd6c13c2b60aa0f862ec9919c83b3366fa90e279d3906630a40b698d94dafe0c5a9d70125dab6a446cedc605caa355b6dbb56e49f67a2cd556e8a0cf3167d69effa46f363d8b23074c86270b1cc654f75a8eea2a3f816b903ff8bb55b5b3421ffd3975df53d34201828337357bb1bd087c59b98f0bcc96d6ff4e8638811a5c9a1aabb1d16cbed8b0d7b26df0734f7208a49d7d13bafa5770085302f6a3904d1a52988b2bbd3cdf368309fd796f178f0d9f28f220c723aad83c76c2b7a723be1572e4fadaea0d44a75292e4da1667f6c4d579205d43ac075413dbee87cd24871581ee15da845ccde34eb77792d524bfba351bf1e4f1479d65b8e4033785d72874654e68e860076b404f2811b436bf09d753a4dad9b246315d495dd9b1da032c09b4d61a3911725194925f873b18f2a1faeccae0331c427518c0bb75ee01df2389425d62285140c28a25abd20bc80ddd69582d3a0713bb8182ef3e370166c4c09001c5ab0d87507466515c499ea5867a82743b18cb4508f214aebe8375eb23f4d5289394d884f94cefe241616b2ed9be54e473a24cc8f461a994505211087b1fd5391a95ad2acb667006260df3bdef6b6ccad42b5334f", 0xffe}, {&(0x7f0000002540)="91f2d434959f0883b04a8b3db667d73090f25bba13ded7fc9e6ab142b6fa9626ff63cb22bd", 0x25}, {&(0x7f0000002580)}], 0x4, &(0x7f0000002600)=[@txtime={{0x18, 0x1, 0x3d, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x8000}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x5a}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x5ae03057}}, @txtime={{0x18, 0x1, 0x3d, 0x7c}}], 0xd8}}], 0x6, 0x8000) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000028c0)={'geneve1\x00', &(0x7f0000002880)=@ethtool_pauseparam={0x12, 0x1, 0x3, 0xfff}}) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000002900)) r2 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f0000002980)) openat$vcs(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/vcs\x00', 0x2000, 0x0) fork() [ 1274.769334][ T724] BPF:[1] Invalid name_offset:620756992 [ 1274.792169][ T727] BPF:[1] Invalid name_offset:620756992 06:51:12 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002980)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000029c0)={'vcan0\x00'}) 06:51:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x43000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:12 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000001340)=[{&(0x7f0000000000)=""/240, 0xf0}, {0x0}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x3, &(0x7f0000002500)=[{&(0x7f00000013c0)=""/197, 0xc5}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0x2, 0x0) 06:51:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8916, &(0x7f0000000080)) [ 1274.865137][ T733] BPF:[1] Invalid name_offset:150994944 [ 1274.899100][ T737] BPF:[1] Invalid name_offset:150994944 06:51:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0xa000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:12 executing program 1: io_uring_register$IORING_UNREGISTER_BUFFERS(0xffffffffffffffff, 0x1, 0x0, 0x0) 06:51:12 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000180)={0x0, "a7d21bf80029f311f35962f8578d1cf196c89e23b9e88b1dc3c23a35a08d5af49c1e83f899c5bf9edba54fb76a8018dc6ab2b6b6c998fee6fbd28d8b4db6237c"}, 0x48, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000400)='/dev/nvme-fabrics\x00') 06:51:12 executing program 3: r0 = getpgid(0x0) sched_rr_get_interval(r0, 0x0) [ 1274.935787][ T740] BPF:[1] Invalid name_offset:1124073472 [ 1274.971494][ T750] BPF:[1] Invalid name_offset:1124073472 06:51:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x48000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1275.055768][ T757] BPF:[1] Invalid name_offset:167772160 06:51:12 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, 0x0, 0x0) 06:51:12 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) 06:51:12 executing program 3: openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x4200, 0x0) 06:51:12 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000d80)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000200)="fa762602e6f29781948967127841b55724a5c889a6e4fd7f551ed3f2fb2ed6fc7269b46841d8502c082f84b5cb260aec757f13bdccc0f2a98b51e4c59b973b2499735bc7f244e08ea10aa68699c89a6c855379045ba78723cd0c4756e3f0c5f7c9dcabb2c1565288896e8a7f9ce4a2214d53b020aa5a1878542273fd84b280e87d300328f6bd93a5cc0a1a99c1a9cb6e87ed47838c8c259b1830b796030c510a040ef1a8a4b67e3a00d28d6652fb", 0xae}, {0x0}], 0x2, &(0x7f0000000440)=[@txtime={{0x18}}, @mark={{0x14}}], 0x30}}], 0x1, 0x0) [ 1275.096024][ T763] BPF:[1] Invalid name_offset:167772160 [ 1275.129862][ T764] BPF:[1] Invalid name_offset:1207959552 06:51:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0xb000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1275.157116][ T766] BPF:[1] Invalid name_offset:1207959552 06:51:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x4c000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:13 executing program 0: ioctl$HIDIOCGDEVINFO(0xffffffffffffffff, 0x801c4803, 0x0) 06:51:13 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000feb000/0x13000)=nil, 0x13000, 0x0, 0x100010, r0, 0x0) [ 1275.223723][ T777] BPF:[1] Invalid name_offset:184549376 06:51:13 executing program 5: add_key$fscrypt_v1(&(0x7f0000002e00)='logon\x00', &(0x7f0000002e40)={'fscrypt:', @auto=[0x36, 0x62, 0x35, 0x65, 0x37, 0x63, 0x63]}, &(0x7f0000002e80)={0x0, "580dd27b46f616b658d9b5b3a6ebc1d342b8e6ca8c9cc1e6340fde7505f25de800162e917366c3dd15bcf8139056c0fddfa2f3f72265095fc986b323100f20d9"}, 0x48, 0xfffffffffffffffe) 06:51:13 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x40) [ 1275.301083][ T781] BPF:[1] Invalid name_offset:184549376 [ 1275.335865][ T790] BPF:[1] Invalid name_offset:1275068416 06:51:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0xc000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:13 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x200a00) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000040)='/dev/vcs#\x00', 0x0, r0) 06:51:13 executing program 5: socket(0x1d, 0x5, 0x0) 06:51:13 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={&(0x7f0000000040)=@qipcrtr, 0x80, 0x0}, 0x0) [ 1275.361057][ T792] BPF:[1] Invalid name_offset:1275068416 06:51:13 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000140)={'syz_tun\x00'}) 06:51:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x60000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1275.440464][ T799] BPF:[1] Invalid name_offset:201326592 [ 1275.466851][ T803] BPF:[1] Invalid name_offset:201326592 [ 1275.472748][ T802] can: request_module (can-proto-0) failed. 06:51:13 executing program 0: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:51:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0xd000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x68000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1275.506367][ T810] BPF:[1] Invalid name_offset:1610612736 [ 1275.515250][ T811] BPF:[1] Invalid name_offset:1610612736 [ 1275.524487][ T802] can: request_module (can-proto-0) failed. 06:51:13 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self\x00', 0x41681, 0x0) 06:51:13 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x101400, 0x0) [ 1275.584708][ T814] BPF:[1] Invalid name_offset:218103808 06:51:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0x0) [ 1275.625667][ T819] BPF:[1] Invalid name_offset:218103808 [ 1275.649337][ T821] BPF:[1] Invalid name_offset:1744830464 06:51:13 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) accept4(r0, 0x0, 0x0, 0x0) 06:51:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0xe000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x80108906, 0x0) [ 1275.690679][ T821] BPF:[1] Invalid name_offset:1744830464 [ 1275.792439][ T832] BPF:[1] Invalid name_offset:234881024 [ 1275.829185][ T832] BPF:[1] Invalid name_offset:234881024 06:51:14 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x5460, 0xffffffffffffffff) 06:51:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0xf000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x125f, 0xffffffffffffffff) 06:51:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x6c000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:14 executing program 1: r0 = getpid() process_vm_readv(r0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/222, 0xde}], 0x1, &(0x7f0000001500)=[{&(0x7f00000002c0)=""/181, 0xb5}], 0x1, 0x0) 06:51:14 executing program 3: select(0x40, &(0x7f0000000000)={0x2}, &(0x7f0000000040)={0x6}, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) 06:51:14 executing program 0: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001a80)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000001b80)={&(0x7f0000001ac0), 0xc, 0x0}, 0x40010) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000004580)={&(0x7f0000004480)={0x10, 0x0, 0x0, 0x4000000}, 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x40040) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000004dc0), &(0x7f0000004e00)=0x4) 06:51:14 executing program 5: openat$uinput(0xffffffffffffff9c, &(0x7f0000006dc0)='/dev/uinput\x00', 0x0, 0x0) [ 1276.322253][ T849] BPF:[1] Invalid name_offset:251658240 [ 1276.329094][ T848] BPF:[1] Invalid name_offset:1811939328 [ 1276.340126][ T852] BPF:[1] Invalid name_offset:1811939328 [ 1276.361431][ T851] BPF:[1] Invalid name_offset:251658240 06:51:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) 06:51:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x10000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x74000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1276.378462][ T855] sctp: [Deprecated]: syz-executor.0 (pid 855) Use of int in maxseg socket option. [ 1276.378462][ T855] Use struct sctp_assoc_value instead [ 1276.417688][ T858] sctp: [Deprecated]: syz-executor.0 (pid 858) Use of int in maxseg socket option. [ 1276.417688][ T858] Use struct sctp_assoc_value instead 06:51:14 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, 0x0, 0x0, 0x0, 0x0) 06:51:14 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x22, &(0x7f0000002b80), 0x10) 06:51:14 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x12, 0x0, 0x0) [ 1276.480022][ T862] BPF:[1] Invalid name_offset:268435456 [ 1276.509060][ T867] BPF:[1] Invalid name_offset:1946157056 [ 1276.518438][ T869] BPF:[1] Invalid name_offset:268435456 06:51:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8902, 0x0) 06:51:14 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x5411, 0x0) [ 1276.537434][ T872] BPF:[1] Invalid name_offset:1946157056 06:51:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x11000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x7a000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:14 executing program 0: r0 = socket$tipc(0x1e, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000000240)=[{{&(0x7f0000000000)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001680)=[{&(0x7f0000000080)="5b4665fee70500000013070000000000000067302e73a4b5085383527684953ed8b8066fd06b283eabac390704b72ac4080b400530811be8102544f47341c399bd0388d9c83e86fa4177da5bae83503e4ba136aecfdcdb65a9961f7b18989c5b486872c77610385601b6e843512ba70b6410eb3aa0f1f67d40a6c440423e9a79db845ef24a8b605394bc9f5147474fdce45b921eb0454db44c78ebae5fff97e12d10e10f9faaa5fb85efe2baafd61f08be19e1cf395cc9c163338d7983496a3f4d003d51d2f4b2cc9f1775e328d46c5707ee9d902aa6a11800"/226, 0xffffffffffffff74}, {&(0x7f0000000180)="8d939b2a91eb6bf884045185e447079c66bec55f526239575a8246175e77dd4faad21654ea98330ef3ff776236b08e213c23c9da5cb011173c79186a50f3f467f219e2d0a0ad73a9335670f5c8829a79f813831d2a0ddb863c51756f94ae1270bff534ac5394f4549c1bf94995cc10d55b2fa3d7e51b546fe38d06e59c67d35f17dcddc80d3cbc041c5b92278c0a6fcff1a76dc345535eb108f1f9c5940f471793820229eaf4", 0xa6}, {&(0x7f00000017c0)="a58f7986ff77a67d0a4e59e4a53c27b14a62f12e3fc74e66a6201b08a82202831bf0c98de23fc72f5e15f37dd45c85749579336752f917b87da192d0dbcdae04cf14d7fc92300138192dbc0ea06287d8b591139d1db4ea8125c5cd42533300e7ec22c4d45bc2d338fca169e0789874fb959d87c399abfd533522b5668104b4dd7c0cfbeb3b44106d2695a4b09c00b807716b2e6bd61b2d248a0229ea54e9fcd9c7123961eb694eb8738b4b763b062eea809c848ef9c27150231f7d0e94f538475a8419a75a779f72f29854b0ce30639c94aeda59538446b84e07", 0xda}, {&(0x7f00000002c0)="999f5b58ea3c6dad6800ab9ba5bb57b18d607307e6560a2bf66102f8f833ae7b9ee074c7fc7e22b91331fef5152a3028eba5d7322598eccf4291b5bd7b73b86a16c752e1be6d7baeac8cd9cb8aee4a9ea5f1c151b678ff", 0x57}, {&(0x7f00000003c0)="87e908fbd7638aa77d65454b6cbecb96301baaa42422816f05a3bb156d9ffa4d557dc0d2733fd29309416c93ac12380926d03c6ffc32d101a928d472e44635a06e3cbf0921d2d0ddce7ac288381fa1a6824217dc3a3da00d72f65edb3547050673a1b30f27f90748f09e2dbc016088e7cd3b00e651bfc140d7c064a263088d8265113731d909d630c0d6eb9409934a4856972abbe3cc59548ba994db7429a08efde9d0e8fe83e4854e34c7bcce59cae67c68dd281c572174fb0b6a0178e7c5d3519e900c", 0xc4}, {&(0x7f0000002040)="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", 0x1a4}, {&(0x7f0000000580)="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", 0xfc}, {&(0x7f0000000680)="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", 0x1000}], 0x61, &(0x7f0000001700)=[@timestamping={{0x14}}], 0x18}}, {{&(0x7f0000001740)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x80, &(0x7f0000001ec0), 0x0, &(0x7f0000001f80)=[@mark={{0x14}}], 0x18}}], 0x2, 0x0) 06:51:14 executing program 3: r0 = fsopen(&(0x7f0000000480)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, 0x0, 0x0, 0x0) 06:51:14 executing program 5: openat$cgroup_root(0xffffffffffffff9c, 0xfffffffffffffffe, 0x200002, 0x0) [ 1276.660270][ T884] BPF:[1] Invalid name_offset:285212672 [ 1276.699735][ T893] BPF:[1] Invalid name_offset:285212672 06:51:14 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x80041284, 0xffffffffffffffff) [ 1276.702325][ T892] BPF:[1] Invalid name_offset:2046820352 06:51:14 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x13, 0x0, 0x0) 06:51:14 executing program 0: select(0x40, &(0x7f0000000000)={0x2}, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2710}) 06:51:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x12000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:14 executing program 5: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000440)='/dev/nvme-fabrics\x00', 0x4000, 0x0) [ 1276.773049][ T902] BPF:[1] Invalid name_offset:2046820352 06:51:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0xa0000000, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf32(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 06:51:14 executing program 3: fsopen(&(0x7f0000000100)='xfs\x00', 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) fsopen(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 06:51:14 executing program 0: syz_io_uring_setup(0x427e, &(0x7f0000000300), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fec000/0x14000)=nil, &(0x7f0000000380), 0x0) [ 1276.870400][ T912] BPF:[1] Invalid name_offset:301989888 [ 1276.893867][ T918] BPF:[1] Invalid name_offset:301989888 06:51:14 executing program 5: socketpair(0xa, 0x0, 0x990, &(0x7f0000000080)) 06:51:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x20000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000003b80)={0x1, 0x3, &(0x7f0000003980)=@framed, &(0x7f00000039c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 06:51:14 executing program 3: openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x2c002, 0x0) [ 1276.930814][ T923] BPF:[1] Invalid name_offset:2684354560 [ 1276.956508][ T925] BPF:[1] Invalid name_offset:2684354560 06:51:14 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000680)={&(0x7f0000000040)=@qipcrtr, 0x80, 0x0}, 0x10140) 06:51:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0xffff0f00, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:14 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x1}, 0x40) 06:51:14 executing program 1: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x100000001}, &(0x7f0000000100)={0x0, r0/1000+60000}) [ 1277.086812][ T936] BPF:[1] Invalid name_offset:536870912 [ 1277.107147][ T941] BPF:[1] Invalid name_offset:4294905600 [ 1277.115777][ T942] BPF:[1] Invalid name_offset:536870912 06:51:14 executing program 0: add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000180)={0x0, "a7d21bf80029f311f35962f8578d1cf196c89e23b9e88b1dc3c23a35a08d5af49c1e83f899c5bf9edba54fb76a8018dc6ab2b6b6c998fee6fbd28d8b4db6237c"}, 0x48, 0xfffffffffffffffc) [ 1277.135105][ T943] BPF:[1] Invalid name_offset:4294905600 06:51:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x25000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:15 executing program 5: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0xffffffff, 0x147901) 06:51:15 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x17, &(0x7f0000002b80), 0x10) 06:51:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:15 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf) 06:51:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x7}, 0x8) 06:51:15 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000440)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, &(0x7f0000000300)=[{0x0}, {0x0}], 0x2}, 0x0) [ 1277.290910][ T956] BPF:[1] Invalid name_offset:620756992 [ 1277.317223][ T957] BPF:[1] FUNC_PROTO (anon) [ 1277.321806][ T957] BPF: [ 1277.324658][ T957] BPF:meta_left:16 meta_needed:24 06:51:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8914, &(0x7f0000000080)) [ 1277.336926][ T963] BPF:[1] Invalid name_offset:620756992 [ 1277.361174][ T957] BPF: [ 1277.361174][ T957] 06:51:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x26000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:15 executing program 0: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(r0, 0x1, 0x0, 0x0) 06:51:15 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000001340)=[{&(0x7f0000000000)=""/240, 0xf0}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2, &(0x7f0000002500)=[{&(0x7f00000013c0)=""/197, 0xc5}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0x2, 0x0) [ 1277.424394][ T968] BPF:[1] FUNC_PROTO (anon) [ 1277.441729][ T968] BPF: [ 1277.450974][ T968] BPF:meta_left:16 meta_needed:24 [ 1277.462089][ T968] BPF: [ 1277.462089][ T968] 06:51:15 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0xc0189436, 0xffffffffffffffff) 06:51:15 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x200}]}) [ 1277.491904][ T977] BPF:[1] Invalid name_offset:637534208 06:51:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x89a0, &(0x7f0000000080)) 06:51:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0xa, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1277.535556][ T979] BPF:[1] Invalid name_offset:637534208 06:51:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x3f000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:15 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 06:51:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8940, &(0x7f0000000080)) [ 1277.632044][ T992] BPF:[1] FUNC_PROTO (anon) [ 1277.642634][ T992] BPF: [ 1277.650751][ T992] BPF:meta_left:16 meta_needed:80 [ 1277.670651][ T992] BPF: [ 1277.670651][ T992] [ 1277.677836][ T999] BPF:[1] Invalid name_offset:1056964608 [ 1277.686266][ T1001] BPF:[1] Invalid name_offset:1056964608 [ 1277.707977][ T1004] BPF:[1] FUNC_PROTO (anon) [ 1277.722304][ T1004] BPF: [ 1277.734216][ T1004] BPF:meta_left:16 meta_needed:80 [ 1277.746880][ T1004] BPF: [ 1277.746880][ T1004] 06:51:15 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) 06:51:15 executing program 0: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01"], 0x6c}}, 0x0) 06:51:15 executing program 3: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000040)) 06:51:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x43000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:15 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000180)=ANY=[], 0xee) 06:51:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x64, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:16 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) [ 1278.212365][ T1024] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1278.240131][ T1026] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.0'. 06:51:16 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x328a) [ 1278.281525][ T1030] BPF:[1] FUNC_PROTO (anon) [ 1278.291983][ T1031] BPF:[1] Invalid name_offset:1124073472 [ 1278.320267][ T1030] BPF: 06:51:16 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) poll(&(0x7f00000000c0)=[{r1}, {r0, 0x243}], 0x2, 0x0) 06:51:16 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'hsr0\x00', 0x0}) 06:51:16 executing program 1: r0 = fsopen(&(0x7f0000001100)='nfs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000180)='nfs\x00', &(0x7f0000000080)="c9", 0x1) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) [ 1278.334100][ T1035] BPF:[1] Invalid name_offset:1124073472 [ 1278.351186][ T1030] BPF:meta_left:16 meta_needed:800 [ 1278.370663][ T1030] BPF: [ 1278.370663][ T1030] 06:51:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x48000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1278.406055][ T1045] BPF:[1] FUNC_PROTO (anon) 06:51:16 executing program 5: rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x9f9}) 06:51:16 executing program 0: migrate_pages(0x0, 0x4, 0x0, &(0x7f0000000100)=0x7) 06:51:16 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @broadcast}]}, &(0x7f0000000100)=0x10) [ 1278.432686][ T1045] BPF: [ 1278.450628][ T1045] BPF:meta_left:16 meta_needed:800 06:51:16 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000000), 0x10) 06:51:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x1cf9, 0x4) [ 1278.483284][ T1051] BPF:[1] Invalid name_offset:1207959552 [ 1278.502600][ T1045] BPF: [ 1278.502600][ T1045] [ 1278.516300][ T1056] BPF:[1] Invalid name_offset:1207959552 06:51:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x3fe, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:16 executing program 1: openat$cachefiles(0xffffffffffffff9c, 0x0, 0x8440, 0x0) 06:51:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x4c000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:16 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000000d80)=[{{&(0x7f0000000000)=@can, 0x80, &(0x7f0000000400)=[{0x0}, {0x0}], 0x2, &(0x7f0000000440)=[@txtime={{0x18}}, @mark={{0x14}}], 0x30}}], 0x1, 0x0) 06:51:16 executing program 5: socketpair(0x11, 0x3, 0xd40, &(0x7f0000000140)) 06:51:16 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, 0x0, &(0x7f00000003c0)) 06:51:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f000000a900)={0x0, 0x0, &(0x7f000000a8c0)={&(0x7f0000009f80)=ANY=[@ANYBLOB='('], 0x928}}, 0x0) [ 1278.651032][ T1069] BPF:[1] Invalid name_offset:1275068416 [ 1278.688612][ T1072] BPF:[1] Invalid name_offset:1275068416 [ 1278.707450][ T1075] BPF:[1] FUNC_PROTO (anon) 06:51:16 executing program 3: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0xbe2d9a308a25f463, 0x0) 06:51:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x60000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:16 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) copy_file_range(r0, &(0x7f0000000040), r1, &(0x7f0000000080), 0x0, 0x0) 06:51:16 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a80)={'team0\x00'}) [ 1278.737378][ T1075] BPF: [ 1278.756987][ T1075] BPF:meta_left:16 meta_needed:8176 06:51:16 executing program 0: process_vm_readv(0x0, &(0x7f0000000540)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1, &(0x7f0000000800)=[{&(0x7f00000005c0)=""/254, 0xfe}, {0x0}], 0x2, 0x0) [ 1278.830839][ T1075] BPF: [ 1278.830839][ T1075] [ 1278.880918][ T1091] BPF:[1] FUNC_PROTO (anon) [ 1278.903707][ T1092] BPF:[1] Invalid name_offset:1610612736 [ 1278.911050][ T1091] BPF: [ 1278.915154][ T1091] BPF:meta_left:16 meta_needed:8176 06:51:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x1001, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x40049409, 0xffffffffffffffff) 06:51:16 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0xc0045878, 0xffffffffffffffff) 06:51:16 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x20142) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x20142) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, 0xffffffffffffffff) r3 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0], 0x2}) sendmsg$SMC_PNETID_FLUSH(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0xa6}, 0x800) 06:51:16 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x1, 0x0) write$binfmt_misc(r0, 0x0, 0x0) [ 1278.935485][ T1091] BPF: [ 1278.935485][ T1091] [ 1278.952541][ T1094] BPF:[1] Invalid name_offset:1610612736 06:51:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x68000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:16 executing program 3: add_key(&(0x7f00000000c0)='big_key\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) 06:51:16 executing program 0: r0 = getpid() process_vm_readv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/58, 0x3a}, {&(0x7f0000000040)=""/222, 0xde}], 0x2, &(0x7f0000001500)=[{&(0x7f0000000240)=""/82, 0x52}, {&(0x7f00000002c0)=""/181, 0xb5}, {0x0}, {&(0x7f00000003c0)=""/34, 0x22}, {0x0}], 0x5, 0x0) 06:51:16 executing program 5: fsopen(&(0x7f0000000340)='erofs\x00', 0x0) [ 1279.082621][ T1111] BPF:[1] FUNC_PROTO (anon) [ 1279.093868][ T1111] BPF: [ 1279.100821][ T1111] BPF:meta_left:16 meta_needed:32776 [ 1279.111430][ T1112] BPF:[1] Invalid name_offset:1744830464 06:51:16 executing program 1: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x8440, 0x0) [ 1279.129518][ T1111] BPF: [ 1279.129518][ T1111] 06:51:17 executing program 0: syz_open_dev$hiddev(&(0x7f0000000000)='/dev/usb/hiddev#\x00', 0x0, 0x248400) [ 1279.163209][ T1112] BPF:[1] Invalid name_offset:1744830464 [ 1279.177031][ T1120] BPF:[1] FUNC_PROTO (anon) [ 1279.193592][ T1120] BPF: [ 1279.204169][ T1120] BPF:meta_left:16 meta_needed:32776 06:51:17 executing program 5: request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0xfffffffffffffffb) [ 1279.246371][ T1120] BPF: [ 1279.246371][ T1120] 06:51:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x6c000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:17 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1}}], 0x1, 0x0) fork() io_setup(0x800, &(0x7f0000000180)) 06:51:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:17 executing program 3: rt_sigqueueinfo(0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x9}) 06:51:17 executing program 0: socket(0xa, 0x5, 0xf1) 06:51:17 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{0x0}, {0x0}], 0x2}, 0x0) [ 1279.397813][ T1135] BPF:[1] Invalid name_offset:1811939328 06:51:17 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) fork() 06:51:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x74000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1279.444600][ T1145] BPF:[1] Invalid name_offset:1811939328 [ 1279.476142][ T1147] BPF:[1] FUNC_PROTO (anon) 06:51:17 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000040)) 06:51:17 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, 0x0, 0x0) [ 1279.523031][ T1147] BPF:return=0 args=( [ 1279.541600][ T1154] BPF:[1] Invalid name_offset:1946157056 [ 1279.563171][ T1157] BPF:[1] Invalid name_offset:1946157056 06:51:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x7a000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:17 executing program 3: pselect6(0x40, &(0x7f0000000300), 0x0, &(0x7f0000000380), 0x0, 0x0) [ 1279.604183][ T1147] BPF:0 (anon) [ 1279.635002][ T1147] BPF:, vararg [ 1279.671314][ T1147] BPF:) 06:51:17 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x32d001, 0x0) 06:51:17 executing program 1: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self\x00', 0x0, 0x0) waitid$P_PIDFD(0x3, r0, 0x0, 0x4, 0x0) [ 1279.693666][ T1147] BPF: [ 1279.710033][ T1170] BPF:[1] Invalid name_offset:2046820352 [ 1279.711734][ T1147] BPF:Invalid arg#1 [ 1279.744777][ T1171] BPF:[1] Invalid name_offset:2046820352 [ 1279.778269][ T1147] BPF: [ 1279.778269][ T1147] [ 1279.844983][ T1180] BPF:[1] FUNC_PROTO (anon) [ 1279.855208][ T1180] BPF:return=0 args=( [ 1279.898554][ T1180] BPF:0 (anon) [ 1279.907748][ T1180] BPF:, vararg [ 1279.915387][ T1180] BPF:) [ 1279.923023][ T1180] BPF: [ 1279.931201][ T1180] BPF:Invalid arg#1 [ 1279.940227][ T1180] BPF: 06:51:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x2, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0xa0000000, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:17 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x2, 0xffffffffffffffff) [ 1279.940227][ T1180] [ 1280.014695][ T1190] BPF:[1] Invalid btf_info:d020002 [ 1280.022796][ T1191] BPF:[1] Invalid name_offset:2684354560 [ 1280.025555][ T1192] BPF:[1] Invalid btf_info:d020002 [ 1280.085266][ T1193] BPF:[1] Invalid name_offset:2684354560 06:51:18 executing program 5: prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0xa5) 06:51:18 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self\x00', 0x4000, 0x0) 06:51:18 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmmsg$sock(r0, 0x0, 0x0, 0x0) 06:51:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x3, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0xffff0f00, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:18 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x2, 0x0, 0x10) [ 1280.350217][ T1207] BPF:[1] Invalid btf_info:d030002 [ 1280.369380][ T1208] BPF:[1] Invalid name_offset:4294905600 [ 1280.406369][ T1213] BPF:[1] Invalid name_offset:4294905600 [ 1280.423218][ T1215] BPF:[1] Invalid btf_info:d030002 06:51:18 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81105, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:51:18 executing program 0: bind$l2tp6(0xffffffffffffffff, 0x0, 0x0) 06:51:18 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x0) 06:51:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000004440)={0x0, 0x0, &(0x7f0000004400)={0x0}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000004600)='TIPCv2\x00', 0xffffffffffffffff) 06:51:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x4, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0xffffff7f, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1280.689241][ T1232] BPF:[1] Invalid btf_info:d040002 06:51:18 executing program 3: clock_getres(0x0, &(0x7f0000002140)) 06:51:18 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, 0x0, &(0x7f0000000240)) [ 1280.733292][ T1237] BPF:[1] Invalid btf_info:d040002 [ 1280.743187][ T1240] BPF:[1] Invalid name_offset:4294967167 06:51:18 executing program 5: sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, 0x0, 0x9671c8d7832d0d9a) 06:51:18 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) waitid(0x2, 0x0, &(0x7f0000000100), 0x8, &(0x7f00000001c0)) 06:51:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x5, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:18 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000000)={0x2, 0x0, 0x3e000, 0x0, 0xffffffffffffffff}) [ 1280.840950][ T1246] BPF:[1] Invalid name_offset:4294967167 06:51:18 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCGSKNS(r0, 0x894c, 0x0) 06:51:18 executing program 0: add_key(&(0x7f0000000500)='encrypted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) 06:51:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x5421, 0xffffffffffffffff) 06:51:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1280.937511][ T1255] BPF:[1] Invalid btf_info:d050002 06:51:18 executing program 3: ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) syz_open_dev$vcsn(0x0, 0x0, 0x20142) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f00000007c0)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 06:51:18 executing program 1: syz_io_uring_setup(0x7632, &(0x7f0000000000)={0x0, 0x0, 0x2}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 06:51:18 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x20142) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000007c0)) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x20142) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, 0xffffffffffffffff) waitid$P_PIDFD(0x2, r2, 0x0, 0x1000000, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f00000007c0)) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0], 0x2}) 06:51:18 executing program 5: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) socket(0x1d, 0x0, 0x0) [ 1281.055038][ T1255] BPF:[1] Invalid btf_info:d050002 [ 1281.073145][ T1265] BPF:[2] meta_left:8 meta_needed:12 06:51:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x6, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1281.139570][ T1271] BPF:[2] meta_left:8 meta_needed:12 06:51:19 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = fsopen(&(0x7f0000001100)='nfs\x00', 0x0) ioctl$LOOP_SET_FD(r0, 0x1267, r1) 06:51:19 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) 06:51:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1281.225432][ T1282] BPF:[1] Invalid btf_info:d060002 [ 1281.242678][ T1277] can: request_module (can-proto-0) failed. 06:51:19 executing program 1: perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 06:51:19 executing program 5: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) socket(0x1d, 0x0, 0x0) 06:51:19 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005b40)='./cgroup/syz0\x00', 0x200002, 0x0) [ 1281.301303][ T1293] BPF:[1] Invalid btf_info:d060002 06:51:19 executing program 0: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, 0x0) 06:51:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x7, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1281.387762][ T1303] BPF:[1] FUNC_PROTO (anon) [ 1281.416516][ T1301] can: request_module (can-proto-0) failed. [ 1281.421193][ T1303] BPF: 06:51:19 executing program 1: syz_io_uring_setup(0x427e, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0xcd}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fec000/0x14000)=nil, &(0x7f0000000380), &(0x7f00000003c0)) 06:51:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f000000a900)={0x0, 0x0, &(0x7f000000a8c0)={&(0x7f0000009f80)=ANY=[], 0x928}}, 0x0) 06:51:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x894c, 0x0) [ 1281.447256][ T1303] BPF:meta_left:24 meta_needed:32 [ 1281.474600][ T1303] BPF: [ 1281.474600][ T1303] 06:51:19 executing program 5: rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffa18}) [ 1281.539591][ T1312] BPF:[1] Invalid btf_info:d070002 [ 1281.571109][ T1317] BPF:[1] FUNC_PROTO (anon) 06:51:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1}, 0x40) [ 1281.602201][ T1323] BPF:[1] Invalid btf_info:d070002 [ 1281.618419][ T1317] BPF: 06:51:19 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, 0x0, 0x0) [ 1281.677864][ T1317] BPF:meta_left:24 meta_needed:32 [ 1281.686069][ T1317] BPF: [ 1281.686069][ T1317] 06:51:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:19 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x84a00, 0x0) 06:51:19 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x58cd}], 0x1, 0x0, 0xfffffffffffffded, 0x3e}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 06:51:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x1, 0x3}, 0x40) 06:51:19 executing program 1: r0 = fsopen(&(0x7f0000001100)='nfs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, 0x0, 0x0, 0x0) 06:51:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x8, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:19 executing program 1: add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', 0x0, &(0x7f0000000180)={0x0, "a7d21bf80029f311f35962f8578d1cf196c89e23b9e88b1dc3c23a35a08d5af49c1e83f899c5bf9edba54fb76a8018dc6ab2b6b6c998fee6fbd28d8b4db6237c"}, 0x48, 0xfffffffffffffffc) 06:51:19 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'hsr0\x00', &(0x7f00000000c0)=@ethtool_stats}) 06:51:19 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000004dc0), &(0x7f0000004e00)=0x4) [ 1281.949688][ T1347] BPF:[1] Invalid btf_info:d080002 [ 1281.980578][ T1350] BPF:[1] FUNC_PROTO (anon) [ 1281.990685][ T1357] BPF:[1] Invalid btf_info:d080002 06:51:19 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61b50f57e337ae38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1282.007637][ T1350] BPF: 06:51:19 executing program 3: socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00', 0xffffffffffffffff) 06:51:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x9, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1282.030004][ T1350] BPF:meta_left:24 meta_needed:40 [ 1282.045705][ T1359] sctp: [Deprecated]: syz-executor.0 (pid 1359) Use of int in maxseg socket option. [ 1282.045705][ T1359] Use struct sctp_assoc_value instead [ 1282.055397][ T1350] BPF: [ 1282.055397][ T1350] [ 1282.129203][ T1366] sctp: [Deprecated]: syz-executor.0 (pid 1366) Use of int in maxseg socket option. [ 1282.129203][ T1366] Use struct sctp_assoc_value instead [ 1282.169357][ T1367] BPF:[1] FUNC_PROTO (anon) [ 1282.199394][ T1367] BPF: [ 1282.220392][ T1367] BPF:meta_left:24 meta_needed:40 [ 1282.239253][ T1375] BPF:[1] Invalid btf_info:d090002 06:51:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:20 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000100)=0x1) [ 1282.261064][ T1367] BPF: [ 1282.261064][ T1367] [ 1282.285495][ T1375] BPF:[1] Invalid btf_info:d090002 [ 1282.364661][ T1382] BPF:[1] FUNC_PROTO (anon) [ 1282.381874][ T1382] BPF: [ 1282.390292][ T1382] BPF:meta_left:24 meta_needed:48 [ 1282.411421][ T1382] BPF: [ 1282.411421][ T1382] [ 1282.430269][ T1384] BPF:[1] FUNC_PROTO (anon) [ 1282.443177][ T1384] BPF: [ 1282.449974][ T1384] BPF:meta_left:24 meta_needed:48 [ 1282.460421][ T1384] BPF: [ 1282.460421][ T1384] 06:51:20 executing program 5: add_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)="f9", 0x1, 0xfffffffffffffffc) 06:51:20 executing program 3: wait4(0x0, 0x0, 0xdfafef1930205cb0, 0x0) 06:51:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000180)=ANY=[@ANYBLOB="c1"], 0xee) 06:51:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0xa, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:20 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000380)=0x84) 06:51:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1282.741757][ T1397] BPF:[1] Invalid btf_info:d0a0002 06:51:20 executing program 1: openat$cachefiles(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/cachefiles\x00', 0x10000, 0x0) 06:51:20 executing program 3: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x125702, 0x0) [ 1282.799105][ T1400] BPF:[1] FUNC_PROTO (anon) [ 1282.821733][ T1402] BPF:[1] Invalid btf_info:d0a0002 06:51:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8901, &(0x7f0000000080)) 06:51:20 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8982, &(0x7f0000002980)) [ 1282.868299][ T1400] BPF: 06:51:20 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0xc0101282, 0xffffffffffffffff) [ 1282.931526][ T1400] BPF:meta_left:24 meta_needed:56 06:51:20 executing program 3: sched_setscheduler(0x0, 0x0, &(0x7f0000000000)=0x100) 06:51:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0xb, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1282.995827][ T1400] BPF: [ 1282.995827][ T1400] 06:51:20 executing program 5: socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) 06:51:20 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x541b, 0xffffffffffffffff) 06:51:20 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) [ 1283.081294][ T1417] BPF:[1] FUNC_PROTO (anon) 06:51:20 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x40101283, 0xffffffffffffffff) [ 1283.132831][ T1417] BPF: [ 1283.150175][ T1424] BPF:[1] Invalid btf_info:d0b0002 [ 1283.180322][ T1417] BPF:meta_left:24 meta_needed:56 [ 1283.220433][ T1428] BPF:[1] Invalid btf_info:d0b0002 [ 1283.237511][ T1417] BPF: [ 1283.237511][ T1417] 06:51:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:21 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x25, &(0x7f0000000040)={0x0, 0x3}) 06:51:21 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x80041285, 0xffffffffffffffff) 06:51:21 executing program 1: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000005b00)='/dev/ashmem\x00', 0x0, 0x0) 06:51:21 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) copy_file_range(r0, &(0x7f0000000040), r1, 0x0, 0x0, 0x0) 06:51:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0xc, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1283.387416][ T1442] BPF:[1] Invalid btf_info:d0c0002 06:51:21 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x4}, 0x10) 06:51:21 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/vcs\x00', 0x0, 0x0) write$cgroup_pid(r0, 0x0, 0x0) 06:51:21 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1283.425341][ T1448] BPF:[1] Invalid btf_info:d0c0002 06:51:21 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffffffff}) 06:51:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0xd, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1283.500784][ T1449] BPF:[1] FUNC_PROTO (anon) [ 1283.539849][ T1449] BPF: 06:51:21 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x3, 0x0, 0x0) [ 1283.561046][ T1457] BPF:[1] Invalid btf_info:d0d0002 [ 1283.575440][ T1449] BPF:meta_left:24 meta_needed:64 [ 1283.632666][ T1465] BPF:[1] Invalid btf_info:d0d0002 [ 1283.640943][ T1449] BPF: [ 1283.640943][ T1449] [ 1283.692041][ T1449] BPF:[1] FUNC_PROTO (anon) [ 1283.717574][ T1449] BPF: [ 1283.729897][ T1449] BPF:meta_left:24 meta_needed:64 06:51:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x9, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:21 executing program 1: request_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) 06:51:21 executing program 3: syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x490080) 06:51:21 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000000)={0x0, 0x4}) 06:51:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0xe, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x301, 0xffffffffffffffff) [ 1283.742600][ T1449] BPF: [ 1283.742600][ T1449] 06:51:21 executing program 1: sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, 0x0, 0x3ad6caacff7141b3) [ 1283.836295][ T1479] BPF:[1] Invalid btf_info:d0e0002 [ 1283.851461][ T1481] BPF:[1] FUNC_PROTO (anon) [ 1283.872269][ T1481] BPF: 06:51:21 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000080)) 06:51:21 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x9, 0x0, 0x0) 06:51:21 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0xc000, 0x0) [ 1283.900120][ T1481] BPF:meta_left:24 meta_needed:72 [ 1283.928038][ T1481] BPF: [ 1283.928038][ T1481] 06:51:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000003a80)=@buf={0x28, &(0x7f00000039c0)="ebf37d36736a7c6472a6ed3e40e9fd09753afdae94ec88f53a7a552c88de53b0c2209276faa3670b"}) [ 1283.994587][ T1491] BPF:[1] FUNC_PROTO (anon) [ 1283.997065][ T1490] BPF:[1] Invalid btf_info:d0e0002 06:51:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000140)=[@in], 0x10) [ 1284.070399][ T1491] BPF: [ 1284.104388][ T1491] BPF:meta_left:24 meta_needed:72 06:51:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0xa, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:21 executing program 0: waitid(0x0, 0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) 06:51:21 executing program 1: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) 06:51:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x10, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:21 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8982, 0x0) 06:51:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, 0x0) [ 1284.167334][ T1491] BPF: [ 1284.167334][ T1491] 06:51:22 executing program 5: socket(0x0, 0xc86d9afb3002d5f, 0x0) 06:51:22 executing program 3: getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) [ 1284.293315][ T1516] BPF:[1] Invalid btf_info:d100002 06:51:22 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0)={0x2, 0x7, 0x5}, 0x8) 06:51:22 executing program 1: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x48600) [ 1284.335537][ T1519] BPF:[1] Invalid btf_info:d100002 [ 1284.357116][ T1518] BPF:[1] FUNC_PROTO (anon) 06:51:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x11, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1284.390319][ T1518] BPF: 06:51:22 executing program 1: syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x147901) [ 1284.425515][ T1518] BPF:meta_left:24 meta_needed:80 [ 1284.479001][ T1518] BPF: [ 1284.479001][ T1518] [ 1284.480565][ T1530] BPF:[1] Invalid btf_info:d110002 [ 1284.511828][ T1518] BPF:[1] FUNC_PROTO (anon) [ 1284.526218][ T1518] BPF: [ 1284.538955][ T1534] BPF:[1] Invalid btf_info:d110002 [ 1284.550321][ T1518] BPF:meta_left:24 meta_needed:80 06:51:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0xb, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:22 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) write$UHID_SET_REPORT_REPLY(r0, 0x0, 0x81) 06:51:22 executing program 5: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x100c1) 06:51:22 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f0000001340)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, &(0x7f0000002500)=[{&(0x7f00000013c0)=""/197, 0xc5}, {&(0x7f00000014c0)=""/4096, 0x1000}, {0x0}], 0x3, 0x0) 06:51:22 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000180), 0x4) 06:51:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x12, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1284.579293][ T1518] BPF: [ 1284.579293][ T1518] 06:51:22 executing program 1: getpid() r0 = fork() process_vm_readv(r0, &(0x7f00000003c0)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/85, 0x55}, {0x0}], 0x4, &(0x7f0000001580)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1, 0x0) 06:51:22 executing program 5: r0 = getpid() process_vm_readv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/58, 0x3a}, {&(0x7f0000000040)=""/222, 0xde}, {&(0x7f0000001440)=""/80, 0x50}], 0x3, &(0x7f0000001500)=[{&(0x7f0000000240)=""/82, 0x52}, {&(0x7f00000002c0)=""/181, 0xb5}, {0x0}, {&(0x7f0000000440)=""/4096, 0x1000}, {0x0}], 0x5, 0x0) [ 1284.687105][ T1547] BPF:[1] Invalid btf_info:d120002 [ 1284.700691][ T1548] BPF:[1] FUNC_PROTO (anon) 06:51:22 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) sendmmsg$sock(r0, &(0x7f0000002700)=[{{&(0x7f0000000080)=@sco={0x1f, @fixed={[], 0x10}}, 0x80, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000200)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@mark={{0x14, 0x1, 0x24, 0x80000001}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}, @txtime={{0x18}}, @mark={{0x14}}, @timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}], 0x90}}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000007c0)="f88dd3fb716338042be09480e52d", 0xe}, {0x0}, {0x0}], 0x3}}, {{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000c00)="a9e1d096196a71a64c108dd3129963d49318ebe55974aa199a0c3c4e019b7be499a5ffa84f9312190512a7b58d0265ff51d657ee70fd869a778546cf1da79e33c399f34938d69d1b476bf0d9c9a656833737694e", 0x54}, {&(0x7f0000000e80)="325719af9f4d5a211444e636e89fd107e2802f25a87da7d0c77c88b512bdfe7cc6af20a7a6e7dfcba89ac502", 0x2c}, {&(0x7f0000000f80)="d4e555bd8fb3cdb5b94aaccb6c4d583bf973a8747847a678bb1e7a3f63305b62b837292eea2091184f2abe275ac748480104ff3ad229ff2016c859fdc95febd3903370fc47088e0d95394aab4be64707515fbf81ea3fc06f95ca6f55575bbf6505b39b1827bd836ff3d3bd99474d31b1562a6a1f6e1ae5c08e06ef5e0c091abc2c1353179370cd12aacf962f1870abdfc686c5d2efe325d4678f49f1959b1f685070aed7fd1b803e9cecae61a05efa036e35fb0111d05155324d779abc730f5a2d3ccad5d84a11426aefd8ea1ffd8d0d0eeb351b41885d22b2bdc2a86e5bba91bb3cb3f637c079253bced35b7d8f7de92c", 0xf1}, {0x0}, {0x0}, {&(0x7f0000001180)="05ad330ca34d619dd6677bbd46e77216c4f9757c6a3ab700a68802e9742076ca5b67ccfa9d7655871cd8f9be945bab35e079e453a73cc780b0b6e51b979e753f0bac1644a8449c8dddb3621019acdae23cee70d59742bcb1cdeeb0b24c369dd22921c708ff8a0352ba1009bb7a12b663b1bc871c109904eb9540fc5dc5940bd3d71acffe805eb6ee04f636427a56b814e2a9247fd7f253af7a1f01e3b1a30730ede40ab04c20fc788c622ddeaf330eb1f54945ad3e780412f215f0082d28240892", 0xc1}], 0x6}}], 0x4, 0x8000) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) fork() 06:51:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0xffffffa6}}, 0x0) 06:51:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x1e, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1284.734839][ T1550] BPF:[1] Invalid btf_info:d120002 [ 1284.746110][ T1548] BPF: [ 1284.769725][ T1548] BPF:meta_left:24 meta_needed:88 06:51:22 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000004a40)) [ 1284.820642][ T1548] BPF: [ 1284.820642][ T1548] [ 1284.890778][ T1568] BPF:[1] FUNC_PROTO (anon) [ 1284.915426][ T1570] BPF:[1] Invalid btf_info:d1e0002 [ 1284.922264][ T1568] BPF: 06:51:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0xc, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:22 executing program 3: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010026bd7000ffdbdf25010006000000050021000100000014002000fe800000"], 0x6c}, 0x1, 0x0, 0x0, 0x80c0}, 0x24040000) 06:51:22 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x10180, 0x0) 06:51:22 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x8000000) 06:51:22 executing program 5: rt_sigqueueinfo(0x0, 0x1d, &(0x7f0000000000)={0x0, 0x0, 0x200}) 06:51:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x25, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1284.934563][ T1568] BPF:meta_left:24 meta_needed:88 [ 1284.951906][ T1572] BPF:[1] Invalid btf_info:d1e0002 [ 1284.970552][ T1568] BPF: [ 1284.970552][ T1568] 06:51:22 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0xc0481273, 0xffffffffffffffff) [ 1285.076672][ T1581] BPF:[1] Invalid btf_info:d250002 [ 1285.084344][ T1582] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. 06:51:22 executing program 1: r0 = socket(0xa, 0x3, 0xff) sendmsg$AUDIT_TRIM(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 06:51:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00', r0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 1285.147452][ T1586] BPF:[1] Invalid btf_info:d250002 [ 1285.154644][ T1585] BPF:[1] FUNC_PROTO (anon) 06:51:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8904, &(0x7f0000000080)) [ 1285.177433][ T1588] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1285.215402][ T1585] BPF: [ 1285.228408][ T1585] BPF:meta_left:24 meta_needed:96 06:51:23 executing program 3: fsopen(&(0x7f0000000340)='dax\x00', 0x0) 06:51:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x43, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1285.269189][ T1585] BPF: [ 1285.269189][ T1585] [ 1285.325201][ T1599] BPF:[1] FUNC_PROTO (anon) [ 1285.350721][ T1599] BPF: [ 1285.361198][ T1603] BPF:[1] Invalid btf_info:d430002 [ 1285.371289][ T1599] BPF:meta_left:24 meta_needed:96 [ 1285.398889][ T1606] BPF:[1] Invalid btf_info:d430002 [ 1285.430115][ T1599] BPF: [ 1285.430115][ T1599] 06:51:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0xd, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:23 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}) 06:51:23 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) bpf$ITER_CREATE(0x21, 0x0, 0x0) 06:51:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001580)={'team0\x00'}) 06:51:23 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 06:51:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x48, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:23 executing program 0: add_key$fscrypt_v1(&(0x7f0000002e00)='logon\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0) 06:51:23 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 06:51:23 executing program 3: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000002c40)='cgroup.threads\x00', 0x2, 0x0) [ 1285.608960][ T1619] BPF:[1] Invalid btf_info:d480002 [ 1285.631199][ T1620] BPF:[1] FUNC_PROTO (anon) 06:51:23 executing program 0: add_key(&(0x7f0000000140)='.request_key_auth\x00', 0x0, 0x0, 0x0, 0x0) [ 1285.657518][ T1620] BPF: [ 1285.662981][ T1624] BPF:[1] Invalid btf_info:d480002 [ 1285.674284][ T1620] BPF:meta_left:24 meta_needed:104 06:51:23 executing program 3: sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 06:51:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x4c, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1285.700325][ T1620] BPF: [ 1285.700325][ T1620] [ 1285.709422][ T1634] BPF:[1] FUNC_PROTO (anon) [ 1285.714343][ T1634] BPF: [ 1285.719711][ T1634] BPF:meta_left:24 meta_needed:104 [ 1285.732820][ T1634] BPF: [ 1285.732820][ T1634] 06:51:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0xe, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:23 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x89a0, 0x0) [ 1285.790654][ T1640] BPF:[1] Invalid btf_info:d4c0002 [ 1285.835931][ T1645] BPF:[1] Invalid btf_info:d4c0002 [ 1285.865623][ T1646] BPF:[1] FUNC_PROTO (anon) [ 1285.872161][ T1646] BPF: [ 1285.875929][ T1646] BPF:meta_left:24 meta_needed:112 [ 1285.894027][ T1646] BPF: [ 1285.894027][ T1646] [ 1285.904779][ T1648] BPF:[1] FUNC_PROTO (anon) [ 1285.912278][ T1648] BPF: [ 1285.915780][ T1648] BPF:meta_left:24 meta_needed:112 [ 1285.924894][ T1648] BPF: [ 1285.924894][ T1648] 06:51:24 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000280)) 06:51:24 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x20802, 0x0) 06:51:24 executing program 3: r0 = socket(0x1d, 0x5, 0x0) sendmsg$alg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)=[{0x0}, {&(0x7f00000002c0)="e7e2a417e5ca24d00c1f10bfc00b6c915a992295ddd65da0256889444f1393ef1c83c2801fe7067fe04385118d90045b5d5f040e570e113a5dad69e0cedb79eb11a7d209f03e6fdb97b8effa9d4c39861025e912376c87ccee7e67d4d72c01195552bcdabd669c0ef64350495e0b4e", 0x6f}], 0x2}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r1, 0x125f, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) 06:51:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x60, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x10, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1286.397919][ T1660] BPF:[1] FUNC_PROTO (anon) [ 1286.400112][ T1662] BPF:[1] Invalid btf_info:d600002 [ 1286.420372][ T1659] can: request_module (can-proto-0) failed. [ 1286.423123][ T1660] BPF: [ 1286.445695][ T1660] BPF:meta_left:24 meta_needed:128 [ 1286.449903][ T1659] can: request_module (can-proto-0) failed. [ 1286.462702][ T1666] BPF:[1] Invalid btf_info:d600002 [ 1286.473773][ T1660] BPF: [ 1286.473773][ T1660] 06:51:24 executing program 1: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x982) 06:51:24 executing program 0: fsopen(&(0x7f0000000040)='gfs2meta\x00', 0x0) 06:51:24 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x6, @random="a17c09998dd4"}, 0x10) 06:51:24 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x1b, 0x0, 0x0) 06:51:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x68, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1286.508888][ T1675] BPF:[1] FUNC_PROTO (anon) [ 1286.541540][ T1675] BPF: [ 1286.546164][ T1675] BPF:meta_left:24 meta_needed:128 [ 1286.567528][ T1675] BPF: [ 1286.567528][ T1675] [ 1286.591240][ T1680] BPF:[1] Invalid btf_info:d680002 06:51:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x11, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:24 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x6, @random="a17c09998dd4"}, 0x10) 06:51:24 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x20142) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x20142) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) waitid$P_PIDFD(0x2, r2, 0x0, 0x1000000, 0x0) sendmsg$SMC_PNETID_FLUSH(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x800) [ 1286.629209][ T1686] BPF:[1] Invalid btf_info:d680002 06:51:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x6c, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:24 executing program 0: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000002740)='/proc/self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, 0x0, 0x0) 06:51:24 executing program 1: r0 = fsopen(&(0x7f0000001100)='nfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 06:51:24 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x6, @random="a17c09998dd4"}, 0x10) [ 1286.741292][ T1692] BPF:[1] FUNC_PROTO (anon) [ 1286.743380][ T1695] BPF:[1] Invalid btf_info:d6c0002 [ 1286.772936][ T1698] BPF:[1] Invalid btf_info:d6c0002 [ 1286.773035][ T1692] BPF: 06:51:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 06:51:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x74, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1286.820960][ T1692] BPF:meta_left:24 meta_needed:136 [ 1286.854019][ T1692] BPF: [ 1286.854019][ T1692] 06:51:24 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x18, 0x0, 0x0) 06:51:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000480)='gtp\x00', r0) [ 1286.895132][ T1707] BPF:[1] FUNC_PROTO (anon) [ 1286.915563][ T1707] BPF: [ 1286.926683][ T1707] BPF:meta_left:24 meta_needed:136 06:51:24 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x6, @random="a17c09998dd4"}, 0x10) [ 1286.943444][ T1707] BPF: [ 1286.943444][ T1707] [ 1286.951873][ T1710] BPF:[1] Invalid btf_info:d740002 [ 1286.982196][ T1715] BPF:[1] Invalid btf_info:d740002 06:51:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x12, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:24 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) 06:51:24 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x60080, 0x0) 06:51:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x7a, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:24 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000480)={r1}) 06:51:24 executing program 5: setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x6, @random="a17c09998dd4"}, 0x10) 06:51:24 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) fcntl$lock(r0, 0x0, 0x0) [ 1287.088016][ T1723] BPF:[1] FUNC_PROTO (anon) [ 1287.105608][ T1723] BPF: [ 1287.124260][ T1723] BPF:meta_left:24 meta_needed:144 [ 1287.155215][ T1729] BPF:[1] Invalid btf_info:d7a0002 [ 1287.166246][ T1723] BPF: [ 1287.166246][ T1723] [ 1287.174584][ T1734] BPF:[1] Invalid btf_info:d7a0002 06:51:25 executing program 1: select(0x40, &(0x7f0000000000)={0x1c}, 0x0, 0x0, &(0x7f00000000c0)) [ 1287.206262][ T1737] BPF:[1] FUNC_PROTO (anon) [ 1287.226202][ T1737] BPF: 06:51:25 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x21, &(0x7f0000002b80), 0x10) 06:51:25 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x21, 0x0, 0x0) 06:51:25 executing program 5: setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x6, @random="a17c09998dd4"}, 0x10) 06:51:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0xa0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1287.251734][ T1737] BPF:meta_left:24 meta_needed:144 [ 1287.306606][ T1737] BPF: [ 1287.306606][ T1737] 06:51:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:25 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000440)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, 0x0}, 0x0) 06:51:25 executing program 3: syz_open_dev$sndctrl(0x0, 0x0, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x50831, 0xffffffffffffffff, 0x0) 06:51:25 executing program 5: setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x6, @random="a17c09998dd4"}, 0x10) 06:51:25 executing program 0: getpeername$tipc(0xffffffffffffffff, 0x0, 0x0) [ 1287.363189][ T1752] BPF:[1] Invalid btf_info:da00002 [ 1287.402838][ T1753] BPF:[1] Invalid btf_info:da00002 06:51:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xa0, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x181a41, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 06:51:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x3c}}, 0x0) 06:51:25 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x6, @random="a17c09998dd4"}, 0x10) [ 1287.465821][ T1761] BPF:[1] FUNC_PROTO (anon) [ 1287.484453][ T1761] BPF:return=0 args=( [ 1287.527865][ T1761] BPF:0 (anon) [ 1287.540376][ T1761] BPF:, 0 (anon) [ 1287.548762][ T1767] BPF:[1] Invalid btf_info:a0000002 [ 1287.552214][ T1761] BPF:, 3 (invalid-name-offset) [ 1287.571803][ T1761] BPF:) [ 1287.579391][ T1761] BPF: [ 1287.580012][ T1772] BPF:[1] Invalid btf_info:a0000002 [ 1287.608995][ T1761] BPF:Invalid arg#1 [ 1287.615379][ T1761] BPF: [ 1287.615379][ T1761] 06:51:25 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x6, @random="a17c09998dd4"}, 0x10) 06:51:25 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_upper(r0, 0x0, 0x0, 0x51, 0x5) 06:51:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1287.626041][ T1779] BPF:[1] FUNC_PROTO (anon) [ 1287.633667][ T1779] BPF:return=0 args=( [ 1287.640405][ T1779] BPF:0 (anon) [ 1287.644568][ T1779] BPF:, 0 (anon) [ 1287.651844][ T1779] BPF:, 3 (invalid-name-offset) [ 1287.659357][ T1779] BPF:) [ 1287.694828][ T1779] BPF: [ 1287.715346][ T1779] BPF:Invalid arg#1 06:51:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x2, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1287.736775][ T1779] BPF: [ 1287.736775][ T1779] [ 1287.779591][ T1790] BPF:[1] FUNC_PROTO (anon) [ 1287.800948][ T1795] BPF:[1] Invalid btf_info:d020003 [ 1287.802158][ T1790] BPF:return=0 args=( [ 1287.824100][ T1796] BPF:[1] Invalid btf_info:d020003 [ 1287.830975][ T1790] BPF:0 (anon) [ 1287.842953][ T1790] BPF:, vararg [ 1287.849752][ T1790] BPF:) [ 1287.861469][ T1790] BPF: [ 1287.866405][ T1790] BPF:Invalid arg#1 [ 1287.877152][ T1790] BPF: [ 1287.877152][ T1790] [ 1287.885717][ T1798] BPF:[1] FUNC_PROTO (anon) [ 1287.892772][ T1798] BPF:return=0 args=( [ 1287.897201][ T1798] BPF:0 (anon) [ 1287.900981][ T1798] BPF:, vararg [ 1287.904796][ T1798] BPF:) [ 1287.907990][ T1798] BPF: [ 1287.911028][ T1798] BPF:Invalid arg#1 [ 1287.915416][ T1798] BPF: [ 1287.915416][ T1798] 06:51:26 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x0, @local}, @in6={0xa, 0x0, 0x0, @remote}], 0x2c) 06:51:26 executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 06:51:26 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x6, @random="a17c09998dd4"}, 0x10) 06:51:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x5411, &(0x7f0000000080)) 06:51:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x3, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x2, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:26 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) [ 1288.354120][ T1820] BPF:[1] Invalid btf_info:d030003 [ 1288.375945][ T1822] BPF:[1] FUNC_PROTO (anon) [ 1288.385197][ T1825] BPF:[1] Invalid btf_info:d030003 06:51:26 executing program 5: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x6, @random="a17c09998dd4"}, 0x10) 06:51:26 executing program 0: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x6}, &(0x7f0000000080), 0x0) [ 1288.404136][ T1822] BPF:return=2 args=( 06:51:26 executing program 1: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x6}, &(0x7f00000000c0)) 06:51:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x4, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1288.427196][ T1822] BPF:0 (anon) [ 1288.443041][ T1822] BPF:, vararg [ 1288.462914][ T1822] BPF:) 06:51:26 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) io_cancel(0x0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x6, 0x2, r0, &(0x7f0000000640)="eb9202a5af1bfba5963817800b2ccca29b88a37b2ed9d52dac3907c617914dc5f83432802b69e4f8b526d772e1c8dc29b4f78dff86077f74fb2cd32f55327f0cb2a62eba3de110472bf59f9d6cbc4628e2f5736a5f65778e859ae00ba265a8ea638342b8c9c6932735e8e1f26411f9f6eec735a1ea7434dd4d5523cd11e8cbd2bed085f21307f2810334249c515e070b4698f2c661b055e32925a8807439a00509cc8ef03d8626baffdfc1e0f6921f1689cb72c0f850864a7ed9b48d5fed5274ebb035d35c49b6f5f9c8a6e46a713840720682631468edd0a583e9", 0xdb, 0x8, 0x0, 0x1}, &(0x7f00000007c0)) 06:51:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000003a80)=@buf={0x50, &(0x7f00000039c0)="ebf37d36736a7c6472a6ed3e40e9fd09753afdae94ec88f53a7a552c88de53b0c2209276faa3670bf189794248bc8573fd10e19448341d120128689db848709614054fbb4029a9b383137188ffb94ae2"}) 06:51:26 executing program 5: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x6, @random="a17c09998dd4"}, 0x10) [ 1288.489289][ T1822] BPF: [ 1288.500456][ T1822] BPF:Invalid return type [ 1288.523365][ T1822] BPF: [ 1288.523365][ T1822] [ 1288.560560][ T1842] BPF:[1] Invalid btf_info:d040003 [ 1288.561696][ T1843] BPF:[1] FUNC_PROTO (anon) [ 1288.596399][ T1850] BPF:[1] Invalid btf_info:d040003 06:51:26 executing program 1: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0}, 0x68) [ 1288.608674][ T1843] BPF:return=2 args=( [ 1288.629256][ T1843] BPF:0 (anon) [ 1288.642600][ T1843] BPF:, vararg [ 1288.655158][ T1843] BPF:) 06:51:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x5, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:26 executing program 0: syz_open_dev$video4linux(&(0x7f0000003940)='/dev/v4l-subdev#\x00', 0x0, 0x0) [ 1288.666055][ T1843] BPF: [ 1288.688770][ T1843] BPF:Invalid return type 06:51:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x3, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1288.713001][ T1843] BPF: [ 1288.713001][ T1843] [ 1288.743931][ T1864] BPF:[1] Invalid btf_info:d050003 [ 1288.779151][ T1865] BPF:[1] Invalid btf_info:d050003 [ 1288.795315][ T1868] BPF:[1] FUNC_PROTO (anon) [ 1288.801118][ T1868] BPF:return=3 args=( [ 1288.805535][ T1868] BPF:0 (anon) [ 1288.809590][ T1868] BPF:, vararg [ 1288.813806][ T1868] BPF:) [ 1288.817490][ T1868] BPF: [ 1288.820734][ T1868] BPF:Invalid return type [ 1288.825869][ T1868] BPF: [ 1288.825869][ T1868] [ 1288.832803][ T1871] BPF:[1] FUNC_PROTO (anon) [ 1288.838435][ T1871] BPF:return=3 args=( [ 1288.842960][ T1871] BPF:0 (anon) [ 1288.847438][ T1871] BPF:, vararg [ 1288.851842][ T1871] BPF:) [ 1288.855724][ T1871] BPF: [ 1288.859005][ T1871] BPF:Invalid return type [ 1288.864642][ T1871] BPF: [ 1288.864642][ T1871] 06:51:27 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 06:51:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0)={0x2, 0x7, 0x5, 0x8001}, 0x8) 06:51:27 executing program 5: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x6, @random="a17c09998dd4"}, 0x10) 06:51:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x6, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:27 executing program 0: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x5, 0xffffffffffffffff, 0x0) 06:51:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x4, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:27 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, 0x0, 0x0) [ 1289.317583][ T1892] BPF:[1] FUNC_PROTO (anon) [ 1289.324277][ T1890] BPF:[1] Invalid btf_info:d060003 [ 1289.332909][ T1892] BPF:return=4 args=( [ 1289.349378][ T1895] BPF:[1] Invalid btf_info:d060003 [ 1289.355449][ T1892] BPF:0 (anon) 06:51:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x5452, &(0x7f0000000080)) 06:51:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x7, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1289.366133][ T1892] BPF:, vararg [ 1289.384899][ T1892] BPF:) [ 1289.398030][ T1892] BPF: [ 1289.409887][ T1892] BPF:Invalid return type 06:51:27 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) write$binfmt_misc(r0, 0x0, 0x28) [ 1289.432715][ T1892] BPF: [ 1289.432715][ T1892] 06:51:27 executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000000240)=[{{&(0x7f0000000000)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0, 0x0, &(0x7f0000001700)=[@timestamping={{0x14}}], 0x18}}], 0x1, 0x0) 06:51:27 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, 0x0, 0x0) [ 1289.456656][ T1908] BPF:[1] FUNC_PROTO (anon) [ 1289.473535][ T1908] BPF:return=4 args=( [ 1289.478658][ T1911] BPF:[1] Invalid btf_info:d070003 [ 1289.488578][ T1908] BPF:0 (anon) 06:51:27 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) [ 1289.518004][ T1915] BPF:[1] Invalid btf_info:d070003 [ 1289.523246][ T1908] BPF:, vararg [ 1289.536759][ T1908] BPF:) [ 1289.546448][ T1908] BPF: [ 1289.556715][ T1908] BPF:Invalid return type 06:51:27 executing program 0: fsopen(&(0x7f0000001100)='hfs\x00', 0x0) 06:51:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x8, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:27 executing program 3: r0 = getpgid(0x0) rt_tgsigqueueinfo(0x0, r0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffa18}) [ 1289.571684][ T1908] BPF: [ 1289.571684][ T1908] 06:51:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x5, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:27 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, 0x0, 0x0) 06:51:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000045c0)={0x0, 0x0, &(0x7f0000004500)=[{&(0x7f00000015c0)={0x10, 0x28, 0x1}, 0x10}], 0x1}, 0x0) [ 1289.674360][ T1929] BPF:[1] Invalid btf_info:d080003 06:51:27 executing program 3: ioctl$BTRFS_IOC_INO_PATHS(0xffffffffffffffff, 0xc0389423, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00'}) r0 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @private}}, 0x0) gettid() syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00', r0) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540)={'syz', 0x3}, &(0x7f0000000580)="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", 0xdf2, 0xfffffffffffffffb) 06:51:27 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$CHAR_RAW_DISCARD(r0, 0x1277, 0x0) [ 1289.712542][ T1937] BPF:[1] Invalid btf_info:d080003 [ 1289.719723][ T1936] BPF:[1] FUNC_PROTO (anon) [ 1289.741147][ T1936] BPF:return=5 args=( [ 1289.753439][ T1936] BPF:0 (anon) 06:51:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x9, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1289.765010][ T1936] BPF:, vararg 06:51:27 executing program 5: request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f0000000480)={'syz', 0x1}, 0x0, 0xfffffffffffffffb) 06:51:27 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, 0x0, 0x0) [ 1289.789567][ T1936] BPF:) [ 1289.808535][ T1936] BPF: [ 1289.811334][ T1936] BPF:Invalid return type [ 1289.815842][ T1936] BPF: [ 1289.815842][ T1936] [ 1289.843179][ T1955] encrypted_key: insufficient parameters specified [ 1289.877795][ T1958] BPF:[1] FUNC_PROTO (anon) 06:51:27 executing program 0: syz_io_uring_setup(0x7632, &(0x7f0000000000), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 06:51:27 executing program 5: getrusage(0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) [ 1289.888606][ T1955] encrypted_key: insufficient parameters specified [ 1289.910866][ T1958] BPF:return=5 args=( [ 1289.918930][ T1961] BPF:[1] Invalid btf_info:d090003 [ 1289.932284][ T1958] BPF:0 (anon) 06:51:27 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x200140, 0x0) 06:51:27 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x1a, 0x0, 0x0) [ 1289.943887][ T1958] BPF:, vararg [ 1289.952958][ T1971] BPF:[1] Invalid btf_info:d090003 [ 1289.960778][ T1958] BPF:) [ 1289.969381][ T1958] BPF: [ 1289.996214][ T1958] BPF:Invalid return type [ 1290.012356][ T1958] BPF: [ 1290.012356][ T1958] 06:51:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x6, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:27 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x6, &(0x7f0000002b80), 0x10) 06:51:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0xa, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:27 executing program 5: r0 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) write$6lowpan_enable(r0, &(0x7f00000000c0)='1', 0x1) 06:51:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x541b, &(0x7f0000000080)) 06:51:27 executing program 3: openat$cachefiles(0xffffffffffffff9c, 0x0, 0x20c40, 0x0) 06:51:27 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8982, &(0x7f0000000080)) [ 1290.151146][ T1999] BPF:[1] Invalid btf_info:d0a0003 06:51:27 executing program 0: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000029c0)='/proc/self/attr/exec\x00', 0x2, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000002a00)) 06:51:28 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000002b80), 0x20002b90) 06:51:28 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcs\x00', 0x185000, 0x0) [ 1290.185248][ T2004] BPF:[1] FUNC_PROTO (anon) [ 1290.195746][ T2003] BPF:[1] Invalid btf_info:d0a0003 [ 1290.214380][ T2004] BPF:return=6 args=( [ 1290.232036][ T2004] BPF:0 (anon) 06:51:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0xb, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x0) [ 1290.271110][ T2004] BPF:, vararg [ 1290.282801][ T2004] BPF:) [ 1290.291663][ T2004] BPF: [ 1290.313710][ T2004] BPF:Invalid return type [ 1290.325293][ T2004] BPF: [ 1290.325293][ T2004] [ 1290.343397][ T2024] BPF:[1] Invalid btf_info:d0b0003 [ 1290.343965][ T2025] BPF:[1] FUNC_PROTO (anon) [ 1290.356024][ T2025] BPF:return=6 args=( 06:51:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x7, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:28 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, 0x0) 06:51:28 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 06:51:28 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x4, 0x0, 0x0) 06:51:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x8906, 0x0) 06:51:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0xc, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1290.369788][ T2025] BPF:0 (anon) [ 1290.373766][ T2025] BPF:, vararg [ 1290.376592][ T2026] BPF:[1] Invalid btf_info:d0b0003 [ 1290.379254][ T2025] BPF:) [ 1290.385467][ T2025] BPF: [ 1290.392128][ T2025] BPF:Invalid return type [ 1290.405081][ T2025] BPF: [ 1290.405081][ T2025] [ 1290.466015][ T2035] BPF:[1] FUNC_PROTO (anon) [ 1290.480509][ T2035] BPF:return=7 args=( [ 1290.498491][ T2035] BPF:0 (anon) 06:51:28 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf) 06:51:28 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010026bd7000ffdbdf250100060000000500210001"], 0x6c}, 0x1, 0x0, 0x0, 0x80c0}, 0x24040000) 06:51:28 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x1274, 0xffffffffffffffff) 06:51:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000002c0)={0x2, &(0x7f0000000280)=[{}, {0x3}]}) [ 1290.513508][ T2035] BPF:, vararg [ 1290.518827][ T2041] BPF:[1] Invalid btf_info:d0c0003 [ 1290.537190][ T2035] BPF:) 06:51:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0xd, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1290.557203][ T2035] BPF: [ 1290.558877][ T2043] BPF:[1] Invalid btf_info:d0c0003 [ 1290.562133][ T2035] BPF:Invalid return type [ 1290.586095][ T2035] BPF: [ 1290.586095][ T2035] [ 1290.595407][ T2048] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:51:28 executing program 0: add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) [ 1290.635045][ T2050] BPF:[1] FUNC_PROTO (anon) [ 1290.663780][ T2050] BPF:return=7 args=( [ 1290.676187][ T2050] BPF:0 (anon) [ 1290.681333][ T2050] BPF:, vararg [ 1290.684995][ T2050] BPF:) [ 1290.691858][ T2050] BPF: [ 1290.694857][ T2050] BPF:Invalid return type [ 1290.701703][ T2050] BPF: [ 1290.701703][ T2050] 06:51:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x8, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:28 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005b40)='./cgroup/syz0\x00', 0x200002, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) 06:51:28 executing program 5: select(0x40, &(0x7f0000000000)={0x2}, 0x0, &(0x7f0000000080)={0x4}, &(0x7f00000000c0)={0x0, 0x2710}) 06:51:28 executing program 1: sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x7ccf7239c4a17200) 06:51:28 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) [ 1290.712451][ T2056] BPF:[1] Invalid btf_info:d0d0003 [ 1290.727475][ T2058] BPF:[1] Invalid btf_info:d0d0003 06:51:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0xe, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:28 executing program 1: select(0x0, 0x0, 0x0, &(0x7f0000000080), 0x0) 06:51:28 executing program 5: request_key(&(0x7f00000000c0)='.request_key_auth\x00', 0x0, 0x0, 0xfffffffffffffffb) [ 1290.846041][ T2071] BPF:[1] FUNC_PROTO (anon) 06:51:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, &(0x7f0000005140)) 06:51:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, 0x0, 0xee) 06:51:28 executing program 5: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000000)={0xfffffc01}, 0x8) [ 1290.883327][ T2071] BPF:return=8 args=( [ 1290.890111][ T2071] BPF:0 (anon) [ 1290.897998][ T2071] BPF:, vararg [ 1290.903253][ T2073] BPF:[1] Invalid btf_info:d0e0003 [ 1290.906266][ T2071] BPF:) [ 1290.915854][ T2071] BPF: [ 1290.923189][ T2071] BPF:Invalid return type [ 1290.934795][ T2071] BPF: [ 1290.934795][ T2071] [ 1290.945368][ T2073] BPF:[1] Invalid btf_info:d0e0003 [ 1290.956791][ T2082] BPF:[1] FUNC_PROTO (anon) [ 1290.971119][ T2082] BPF:return=8 args=( 06:51:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x10, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1290.987396][ T2082] BPF:0 (anon) [ 1290.997979][ T2082] BPF:, vararg [ 1291.011332][ T2082] BPF:) [ 1291.017666][ T2082] BPF: 06:51:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x9, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:28 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 06:51:28 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, &(0x7f0000000080)) 06:51:28 executing program 5: openat$vcs(0xffffffffffffff9c, 0x0, 0x1035c3, 0x0) 06:51:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x11, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1291.035509][ T2082] BPF:Invalid return type [ 1291.045873][ T2087] BPF:[1] Invalid btf_info:d100003 [ 1291.046291][ T2082] BPF: [ 1291.046291][ T2082] [ 1291.061488][ T2088] BPF:[1] Invalid btf_info:d100003 06:51:28 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) [ 1291.160427][ T2100] BPF:[1] Invalid btf_info:d110003 [ 1291.166937][ T2099] BPF:[1] FUNC_PROTO (anon) [ 1291.186081][ T2099] BPF:return=9 args=( [ 1291.190351][ T2102] BPF:[1] Invalid btf_info:d110003 [ 1291.208419][ T2099] BPF:0 (anon) [ 1291.211928][ T2099] BPF:, vararg [ 1291.215468][ T2099] BPF:) [ 1291.221352][ T2099] BPF: [ 1291.224233][ T2099] BPF:Invalid return type [ 1291.229340][ T2099] BPF: [ 1291.229340][ T2099] [ 1291.250109][ T2105] BPF:[1] FUNC_PROTO (anon) [ 1291.254820][ T2105] BPF:return=9 args=( [ 1291.259065][ T2105] BPF:0 (anon) [ 1291.262565][ T2105] BPF:, vararg [ 1291.266167][ T2105] BPF:) [ 1291.269764][ T2105] BPF: [ 1291.272801][ T2105] BPF:Invalid return type [ 1291.279354][ T2105] BPF: [ 1291.279354][ T2105] 06:51:29 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000001340)=[{0x0}, {0x0}, {&(0x7f0000000200)=""/247, 0xf7}], 0x3, &(0x7f0000002500)=[{&(0x7f00000013c0)=""/197, 0xc5}, {&(0x7f00000014c0)=""/4096, 0x1000}, {0x0}], 0x3, 0x0) 06:51:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f000000a900)={0x0, 0x0, &(0x7f000000a8c0)={&(0x7f0000009f80)=ANY=[@ANYRES16=0x0, @ANYBLOB="01"], 0x928}}, 0x0) 06:51:29 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x5421, &(0x7f0000000080)) 06:51:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x12, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:29 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0), 0x8) 06:51:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xa, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:29 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000300), &(0x7f0000000380)=0x8) [ 1291.850776][ T2127] BPF:[1] FUNC_PROTO (anon) [ 1291.861416][ T2127] BPF:return=10 args=( [ 1291.874669][ T2127] BPF:0 (anon) [ 1291.878699][ T2136] BPF:[1] Invalid btf_info:d120003 [ 1291.893957][ T2127] BPF:, vararg 06:51:29 executing program 5: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self\x00', 0x248100, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000440), 0x4, &(0x7f00000004c0)) 06:51:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000003a80)=@buf) [ 1291.901111][ T2127] BPF:) [ 1291.908612][ T2127] BPF: [ 1291.912046][ T2145] BPF:[1] Invalid btf_info:d120003 [ 1291.913722][ T2127] BPF:Invalid return type [ 1291.930753][ T2127] BPF: [ 1291.930753][ T2127] 06:51:29 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffea0aaf5d730e10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 06:51:29 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x22, 0x0, 0x0) [ 1291.960450][ T2156] BPF:[1] FUNC_PROTO (anon) 06:51:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x25, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1291.991458][ T2156] BPF:return=10 args=( [ 1292.009398][ T2156] BPF:0 (anon) [ 1292.022940][ T2156] BPF:, vararg 06:51:29 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, 0x0, 0x0) 06:51:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000006f80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x20}, 0x0) 06:51:29 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000180)={0x0, "a7d21bf80029f311f35962f8578d1cf196c89e23b9e88b1dc3c23a35a08d5af49c1e83f899c5bf9edba54fb76a8018dc6ab2b6b6c998fee6fbd28d8b4db6237c"}, 0x48, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffe, 0x0, 0x0) [ 1292.039914][ T2156] BPF:) [ 1292.055759][ T2156] BPF: [ 1292.073359][ T2170] BPF:[1] Invalid btf_info:d250003 [ 1292.083384][ T2156] BPF:Invalid return type 06:51:29 executing program 1: wait4(0x0, 0x0, 0x4, &(0x7f0000000040)) 06:51:29 executing program 5: socketpair(0x29, 0x5, 0x0, &(0x7f00000003c0)) [ 1292.102587][ T2174] BPF:[1] Invalid btf_info:d250003 [ 1292.113656][ T2156] BPF: [ 1292.113656][ T2156] 06:51:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xb, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:30 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x19, 0x0, 0x0) 06:51:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x26, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:30 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = fsopen(&(0x7f0000001100)='nfs\x00', 0x0) ioctl$LOOP_SET_FD(r0, 0x5452, r1) 06:51:30 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDCTL_SYNTH_MEMAVL(r0, 0xc004510e, 0x0) 06:51:30 executing program 5: io_setup(0x1, &(0x7f0000001800)=0x0) io_submit(r0, 0x0, 0x0) [ 1292.252776][ T2192] BPF:[1] Invalid btf_info:d260003 [ 1292.261648][ T2195] BPF:[1] FUNC_PROTO (anon) [ 1292.274310][ T2195] BPF:return=11 args=( [ 1292.281256][ T2195] BPF:0 (anon) [ 1292.285022][ T2195] BPF:, vararg [ 1292.288877][ T2201] BPF:[1] Invalid btf_info:d260003 [ 1292.291628][ T2195] BPF:) [ 1292.298649][ T2195] BPF: 06:51:30 executing program 3: shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000200)=""/222) 06:51:30 executing program 0: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000100), 0x4) 06:51:30 executing program 1: socket(0x28, 0x0, 0x8) 06:51:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x43, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1292.301766][ T2195] BPF:Invalid return type [ 1292.314397][ T2195] BPF: [ 1292.314397][ T2195] 06:51:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4020940d, 0xffffffffffffffff) 06:51:30 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x20202, 0x0) [ 1292.380117][ T2195] BPF:[1] FUNC_PROTO (anon) [ 1292.385031][ T2195] BPF:return=11 args=( [ 1292.402081][ T2195] BPF:0 (anon) [ 1292.423366][ T2195] BPF:, vararg [ 1292.444212][ T2213] BPF:[1] Invalid btf_info:d430003 [ 1292.451737][ T2195] BPF:) [ 1292.456970][ T2195] BPF: [ 1292.464323][ T2195] BPF:Invalid return type [ 1292.471547][ T2218] BPF:[1] Invalid btf_info:d430003 [ 1292.479520][ T2195] BPF: [ 1292.479520][ T2195] 06:51:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xc, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:30 executing program 0: syz_io_uring_setup(0x6d20, &(0x7f0000000000)={0x0, 0x0, 0x20}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fec000/0x14000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 06:51:30 executing program 1: add_key$fscrypt_v1(&(0x7f0000002e00)='logon\x00', &(0x7f0000002e40)={'fscrypt:'}, &(0x7f0000002e80)={0x0, "580dd27b46f616b658d9b5b3a6ebc1d342b8e6ca8c9cc1e6340fde7505f25de800162e917366c3dd15bcf8139056c0fddfa2f3f72265095fc986b323100f20d9"}, 0x48, 0xfffffffffffffffe) 06:51:30 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8953, &(0x7f0000000080)) 06:51:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000100)) 06:51:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x48, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:30 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x1d, 0x0, 0x0) 06:51:30 executing program 5: socketpair(0x11, 0x0, 0x0, &(0x7f0000000140)) 06:51:30 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) read$char_raw(r0, 0x0, 0x0) [ 1292.603620][ T2232] BPF:[1] Invalid btf_info:d480003 [ 1292.617639][ T2233] BPF:[1] FUNC_PROTO (anon) 06:51:30 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) copy_file_range(r0, 0x0, r1, &(0x7f0000000080), 0x0, 0x0) [ 1292.646631][ T2234] BPF:[1] Invalid btf_info:d480003 [ 1292.653895][ T2233] BPF:return=12 args=( [ 1292.666299][ T2233] BPF:0 (anon) [ 1292.683381][ T2233] BPF:, vararg [ 1292.688926][ T2233] BPF:) 06:51:30 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x127c, 0xffffffffffffffff) 06:51:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x4c, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1292.696332][ T2233] BPF: [ 1292.710759][ T2233] BPF:Invalid return type [ 1292.735064][ T2233] BPF: [ 1292.735064][ T2233] [ 1292.765610][ T2248] BPF:[1] Invalid btf_info:d4c0003 [ 1292.773336][ T2250] BPF:[1] Invalid btf_info:d4c0003 [ 1292.778021][ T2249] BPF:[1] FUNC_PROTO (anon) [ 1292.798021][ T2249] BPF:return=12 args=( [ 1292.810276][ T2249] BPF:0 (anon) 06:51:30 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 06:51:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8904, 0x0) 06:51:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x60, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xd, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:30 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x541b, 0x0) 06:51:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x20000005) [ 1292.813801][ T2249] BPF:, vararg [ 1292.820476][ T2249] BPF:) [ 1292.823400][ T2249] BPF: [ 1292.826291][ T2249] BPF:Invalid return type [ 1292.833441][ T2249] BPF: [ 1292.833441][ T2249] [ 1292.901158][ T2261] BPF:[1] Invalid btf_info:d600003 06:51:30 executing program 1: socket(0x1d, 0x5, 0x0) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$CHAR_RAW_RESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f00000004c0)={0x0, 0x35}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) 06:51:30 executing program 5: rt_sigqueueinfo(0x0, 0xc, &(0x7f0000000000)={0x0, 0x0, 0x101}) 06:51:30 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) 06:51:30 executing program 3: syz_io_uring_setup(0x34eb, &(0x7f00000025c0)={0x0, 0x0, 0x2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000002640), &(0x7f0000002680)) [ 1292.936204][ T2264] BPF:[1] FUNC_PROTO (anon) [ 1292.953124][ T2265] BPF:[1] Invalid btf_info:d600003 [ 1292.961529][ T2264] BPF:return=13 args=( 06:51:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x68, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1292.990325][ T2264] BPF:0 (anon) [ 1292.998132][ T2264] BPF:, vararg [ 1293.011083][ T2264] BPF:) [ 1293.019715][ T2269] can: request_module (can-proto-0) failed. [ 1293.031441][ T2264] BPF: 06:51:30 executing program 5: connect$tipc(0xffffffffffffffff, 0x0, 0x0) 06:51:30 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) [ 1293.042172][ T2264] BPF:Invalid return type [ 1293.058181][ T2269] can: request_module (can-proto-0) failed. [ 1293.068085][ T2264] BPF: [ 1293.068085][ T2264] [ 1293.085470][ T2283] BPF:[1] FUNC_PROTO (anon) 06:51:30 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind(r0, 0x0, 0x0) 06:51:30 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0xc020660b, 0xffffffffffffffff) [ 1293.099655][ T2283] BPF:return=13 args=( [ 1293.105830][ T2283] BPF:0 (anon) [ 1293.120975][ T2283] BPF:, vararg [ 1293.132857][ T2289] BPF:[1] Invalid btf_info:d680003 [ 1293.146493][ T2283] BPF:) [ 1293.154057][ T2283] BPF: [ 1293.159653][ T2283] BPF:Invalid return type [ 1293.164570][ T2292] BPF:[1] Invalid btf_info:d680003 [ 1293.172163][ T2283] BPF: [ 1293.172163][ T2283] 06:51:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xe, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:31 executing program 5: r0 = fork() process_vm_readv(r0, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000040)=""/9, 0x9}, {&(0x7f0000000080)=""/85, 0x55}, {0x0}], 0x4, &(0x7f0000001580)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001480)=""/25, 0x19}], 0x2, 0x0) 06:51:31 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000001400), &(0x7f0000001440)=0x10) 06:51:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[], 0x3c}}, 0x0) 06:51:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x6c, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000004dc0), &(0x7f0000004e00)=0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) [ 1293.300680][ T2304] BPF:[1] Invalid btf_info:d6c0003 06:51:31 executing program 1: clock_gettime(0x0, &(0x7f00000016c0)) 06:51:31 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = fsopen(&(0x7f0000001100)='nfs\x00', 0x0) ioctl$LOOP_SET_FD(r0, 0x127c, r1) [ 1293.325405][ T2306] BPF:[1] FUNC_PROTO (anon) [ 1293.335284][ T2308] BPF:[1] Invalid btf_info:d6c0003 [ 1293.338772][ T2310] sctp: [Deprecated]: syz-executor.3 (pid 2310) Use of int in maxseg socket option. [ 1293.338772][ T2310] Use struct sctp_assoc_value instead [ 1293.356434][ T2306] BPF:return=14 args=( [ 1293.368075][ T2306] BPF:0 (anon) 06:51:31 executing program 5: prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) 06:51:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x74, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1293.375163][ T2306] BPF:, vararg [ 1293.383304][ T2306] BPF:) [ 1293.390937][ T2306] BPF: [ 1293.414421][ T2306] BPF:Invalid return type 06:51:31 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x141880) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) [ 1293.433904][ T2306] BPF: [ 1293.433904][ T2306] 06:51:31 executing program 1: r0 = getpid() sched_rr_get_interval(r0, &(0x7f00000000c0)) [ 1293.474849][ T2321] BPF:[1] FUNC_PROTO (anon) [ 1293.491048][ T2321] BPF:return=14 args=( [ 1293.505366][ T2321] BPF:0 (anon) [ 1293.511554][ T2322] BPF:[1] Invalid btf_info:d740003 [ 1293.530101][ T2321] BPF:, vararg [ 1293.537363][ T2322] BPF:[1] Invalid btf_info:d740003 [ 1293.544389][ T2321] BPF:) [ 1293.554251][ T2321] BPF: [ 1293.559855][ T2321] BPF:Invalid return type [ 1293.564926][ T2321] BPF: [ 1293.564926][ T2321] 06:51:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xf, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:31 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, 0x0, 0x0) 06:51:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000140)=0xbbbf, 0x4) 06:51:31 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 06:51:31 executing program 3: r0 = gettid() ptrace$peeksig(0x4209, r0, 0x0, 0x0) 06:51:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x7a, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1293.587202][ T3237] ieee802154 phy0 wpan0: encryption failed: -22 [ 1293.593519][ T3237] ieee802154 phy1 wpan1: encryption failed: -22 06:51:31 executing program 5: request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0) 06:51:31 executing program 3: ioprio_set$uid(0x0, 0x0, 0x4003) 06:51:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8934, &(0x7f0000000080)) [ 1293.698147][ T2346] BPF:[1] Invalid btf_info:d7a0003 [ 1293.700393][ T2345] BPF:[1] FUNC_PROTO (anon) [ 1293.733430][ T2348] BPF:[1] Invalid btf_info:d7a0003 [ 1293.744055][ T2345] BPF:return=15 args=( 06:51:31 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) mmap$dsp(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, r0, 0x0) 06:51:31 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind(r0, &(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80) 06:51:31 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000100)) [ 1293.767579][ T2345] BPF:0 (anon) [ 1293.771196][ T2345] BPF:, vararg [ 1293.780977][ T2345] BPF:) [ 1293.788608][ T2345] BPF: [ 1293.800015][ T2345] BPF:Invalid return type [ 1293.829127][ T2345] BPF: [ 1293.829127][ T2345] [ 1293.864588][ T2363] BPF:[1] FUNC_PROTO (anon) [ 1293.872233][ T2363] BPF:return=15 args=( [ 1293.876926][ T2363] BPF:0 (anon) [ 1293.880587][ T2363] BPF:, vararg [ 1293.884243][ T2363] BPF:) [ 1293.888430][ T2363] BPF: [ 1293.891525][ T2363] BPF:Invalid return type 06:51:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x10, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0xa0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f000000a900)={0x0, 0x0, &(0x7f000000a8c0)={0x0, 0x928}}, 0x0) 06:51:31 executing program 5: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dri/renderD128\x00', 0x20000, 0x0) 06:51:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80108906, 0x0) 06:51:31 executing program 3: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x1, 0x0) [ 1293.931221][ T2363] BPF: [ 1293.931221][ T2363] [ 1294.008804][ T2380] BPF:[1] Invalid btf_info:da00003 [ 1294.016002][ T2383] BPF:[1] FUNC_PROTO (anon) [ 1294.025866][ T2384] BPF:[1] Invalid btf_info:da00003 [ 1294.031618][ T2383] BPF:return=16 args=( [ 1294.035963][ T2383] BPF:0 (anon) [ 1294.048388][ T2383] BPF:, vararg 06:51:31 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xc43de80073302a07, 0x1}, 0x40) 06:51:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0x2, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:31 executing program 5: socket(0x0, 0x700, 0x0) 06:51:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002ec0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2043, &(0x7f0000002f80)) 06:51:31 executing program 1: syz_io_uring_setup(0x2fe1, &(0x7f0000000240)={0x0, 0xd728, 0x8}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) [ 1294.057277][ T2383] BPF:) [ 1294.064896][ T2383] BPF: [ 1294.072606][ T2383] BPF:Invalid return type [ 1294.086098][ T2383] BPF: [ 1294.086098][ T2383] [ 1294.131860][ T2390] BPF:[1] FUNC_PROTO (anon) 06:51:31 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x4020940d, &(0x7f0000000080)) [ 1294.157988][ T2395] BPF:[1] PTR (anon) [ 1294.167874][ T2395] BPF:type_id=0 [ 1294.170110][ T2390] BPF:return=16 args=( [ 1294.178539][ T2395] BPF: [ 1294.184974][ T2395] BPF:vlen != 0 [ 1294.192788][ T2390] BPF:0 (anon) [ 1294.203463][ T2395] BPF: [ 1294.203463][ T2395] [ 1294.207590][ T2390] BPF:, vararg [ 1294.220901][ T2390] BPF:) [ 1294.223948][ T2401] BPF:[1] PTR (anon) [ 1294.231762][ T2390] BPF: [ 1294.239650][ T2390] BPF:Invalid return type [ 1294.246583][ T2401] BPF:type_id=0 [ 1294.250049][ T2401] BPF: [ 1294.252390][ T2390] BPF: [ 1294.252390][ T2390] 06:51:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x11, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:32 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x13, &(0x7f0000002b80), 0x10) 06:51:32 executing program 0: select(0x40, &(0x7f0000000000)={0x1c}, 0x0, &(0x7f0000000080), 0x0) 06:51:32 executing program 3: socket(0x22, 0x0, 0x8) 06:51:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f0000001600)={0x14, 0x0, 0x20b}, 0x14}}, 0x0) 06:51:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xa0, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1294.252818][ T2401] BPF:vlen != 0 [ 1294.252826][ T2401] BPF: [ 1294.252826][ T2401] [ 1294.327883][ T2409] BPF:[1] Invalid btf_info:a0000003 06:51:32 executing program 0: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x125f, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x50831, 0xffffffffffffffff, 0x0) 06:51:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, &(0x7f0000001080)) 06:51:32 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000180)={0x0, "a7d21bf80029f311f35962f8578d1cf196c89e23b9e88b1dc3c23a35a08d5af49c1e83f899c5bf9edba54fb76a8018dc6ab2b6b6c998fee6fbd28d8b4db6237c"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000002d00)='logon\x00', 0x0, 0x0, 0x0, r0) 06:51:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x5452, 0xffffffffffffffff) [ 1294.359414][ T2416] BPF:[1] FUNC_PROTO (anon) [ 1294.361612][ T2417] BPF:[1] Invalid btf_info:a0000003 [ 1294.372504][ T2416] BPF:return=17 args=( [ 1294.381663][ T2416] BPF:0 (anon) 06:51:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1294.415338][ T2416] BPF:, vararg [ 1294.431567][ T2416] BPF:) [ 1294.439660][ T2416] BPF: [ 1294.447974][ T2416] BPF:Invalid return type [ 1294.453345][ T2416] BPF: [ 1294.453345][ T2416] 06:51:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000880)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000840)={0x0}}, 0x0) [ 1294.485117][ T2427] BPF:[1] FUNC_PROTO (anon) [ 1294.487130][ T2426] BPF:[1] FUNC_PROTO (anon) [ 1294.514588][ T2427] BPF:return=17 args=( [ 1294.516183][ T2426] BPF:return=0 args=( [ 1294.526904][ T2426] BPF:0 (anon) [ 1294.533804][ T2426] BPF:, 0 (anon) [ 1294.540532][ T2427] BPF:0 (anon) [ 1294.541148][ T2426] BPF:, 3 (invalid-name-offset) [ 1294.551041][ T2427] BPF:, vararg [ 1294.554930][ T2427] BPF:) [ 1294.567278][ T2426] BPF:) [ 1294.576893][ T2426] BPF: [ 1294.577079][ T2427] BPF: [ 1294.584195][ T2426] BPF:Invalid arg#1 [ 1294.585920][ T2427] BPF:Invalid return type [ 1294.597068][ T2426] BPF: [ 1294.597068][ T2426] [ 1294.597871][ T2427] BPF: [ 1294.597871][ T2427] [ 1294.615835][ T2433] BPF:[1] FUNC_PROTO (anon) [ 1294.626287][ T2433] BPF:return=0 args=( [ 1294.630547][ T2433] BPF:0 (anon) 06:51:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x12, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:32 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x414002, 0x0) 06:51:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000002480)={'syztnl1\x00', 0x0}) 06:51:32 executing program 1: openat$ashmem(0xffffffffffffff9c, &(0x7f0000005b00)='/dev/ashmem\x00', 0x0, 0x0) 06:51:32 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, 0x0, &(0x7f0000000100)) [ 1294.634091][ T2433] BPF:, 0 (anon) [ 1294.638023][ T2433] BPF:, 3 (invalid-name-offset) [ 1294.645165][ T2433] BPF:) [ 1294.653589][ T2433] BPF: [ 1294.663090][ T2433] BPF:Invalid arg#1 [ 1294.683311][ T2433] BPF: 06:51:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) [ 1294.683311][ T2433] 06:51:32 executing program 1: openat$ashmem(0xffffffffffffff9c, &(0x7f0000005b00)='/dev/ashmem\x00', 0x0, 0x0) 06:51:32 executing program 0: syz_io_uring_setup(0x427e, &(0x7f0000000300), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fec000/0x14000)=nil, &(0x7f0000000380), &(0x7f00000003c0)) 06:51:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x2, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1294.732905][ T2446] BPF:[1] FUNC_PROTO (anon) [ 1294.750427][ T2446] BPF:return=18 args=( [ 1294.756268][ T2446] BPF:0 (anon) [ 1294.768758][ T2446] BPF:, vararg 06:51:32 executing program 5: sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000840)={0x0, @qipcrtr, @sco, @ax25={0x3, @default}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)='syz_tun\x00', 0x0, 0x0, 0x3}) [ 1294.783156][ T2446] BPF:) [ 1294.793757][ T2446] BPF: [ 1294.805506][ T2446] BPF:Invalid return type [ 1294.822601][ T2456] BPF:[1] FUNC_PROTO (anon) [ 1294.829031][ T2446] BPF: 06:51:32 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000002c0)={0x2, &(0x7f0000000280)=[{}, {0x3, 0x0, 0x0, 0xe8}]}) 06:51:32 executing program 1: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000001780)='/dev/nvme-fabrics\x00', 0x40, 0x0) [ 1294.829031][ T2446] [ 1294.853166][ T2459] BPF:[1] FUNC_PROTO (anon) [ 1294.863056][ T2456] BPF:return=2 args=( [ 1294.871135][ T2459] BPF:return=18 args=( [ 1294.880693][ T2459] BPF:0 (anon) [ 1294.885927][ T2456] BPF:0 (anon) [ 1294.893754][ T2459] BPF:, vararg [ 1294.908406][ T2459] BPF:) [ 1294.914742][ T2456] BPF:, 0 (anon) [ 1294.918679][ T2459] BPF: [ 1294.926196][ T2456] BPF:, 3 (invalid-name-offset) 06:51:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x1e, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:32 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0), 0x8) 06:51:32 executing program 0: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x200, 0x0) 06:51:32 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000003280)='/dev/uhid\x00', 0x0, 0x0) 06:51:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x1268, 0xffffffffffffffff) [ 1294.931127][ T2459] BPF:Invalid return type [ 1294.940720][ T2459] BPF: [ 1294.940720][ T2459] [ 1294.943605][ T2456] BPF:) [ 1294.956676][ T2456] BPF: [ 1294.959470][ T2456] BPF:Invalid return type [ 1294.963890][ T2456] BPF: [ 1294.963890][ T2456] 06:51:32 executing program 5: r0 = fsopen(&(0x7f00000004c0)='pipefs\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, 0x0, 0x0, 0xffffffffffffffff) 06:51:32 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8001, 0x0) [ 1294.989090][ T2456] BPF:[1] FUNC_PROTO (anon) [ 1294.993796][ T2456] BPF:return=2 args=( [ 1295.006329][ T2456] BPF:0 (anon) [ 1295.026893][ T2456] BPF:, 0 (anon) 06:51:32 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000180)={0x0, "a7d21bf80029f311f35962f8578d1cf196c89e23b9e88b1dc3c23a35a08d5af49c1e83f899c5bf9edba54fb76a8018dc6ab2b6b6c998fee6fbd28d8b4db6237c"}, 0x48, 0xfffffffffffffffc) keyctl$clear(0x7, r0) [ 1295.048777][ T2456] BPF:, 3 (invalid-name-offset) [ 1295.062123][ T2476] BPF:[1] FUNC_PROTO (anon) [ 1295.072233][ T2456] BPF:) [ 1295.076271][ T2476] BPF:return=30 args=( [ 1295.082854][ T2456] BPF: [ 1295.085867][ T2456] BPF:Invalid return type [ 1295.090747][ T2476] BPF:0 (anon) [ 1295.094677][ T2476] BPF:, vararg [ 1295.098696][ T2456] BPF: [ 1295.098696][ T2456] [ 1295.110681][ T2476] BPF:) [ 1295.125255][ T2476] BPF: [ 1295.139770][ T2476] BPF:Invalid return type 06:51:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x3, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:32 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f000000b3c0)={0x0, 0x0, &(0x7f000000b380)={0x0}}, 0x0) 06:51:32 executing program 5: syz_80211_inject_frame(&(0x7f0000000300)=@device_b, &(0x7f0000000280)=@mgmt_frame=@disassoc={@wo_ht={{0x0, 0x0, 0xa, 0x0, 0x0, 0x1}, {}, @device_b, @device_a, @from_mac=@broadcast, {0x8}}, 0x37, @val={0x8c, 0x10, {0x280, "c2bb5d981457", @short="b2cf18ddfc2d57f8"}}}, 0x2c) 06:51:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[], 0x5c}}, 0x0) [ 1295.161913][ T2476] BPF: [ 1295.161913][ T2476] [ 1295.225865][ T2483] BPF:[1] FUNC_PROTO (anon) [ 1295.243322][ T2483] BPF:return=30 args=( [ 1295.249404][ T2492] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1295.262193][ T2491] BPF:[1] FUNC_PROTO (anon) [ 1295.266141][ T2483] BPF:0 (anon) 06:51:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x25, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:33 executing program 3: socket$inet(0x2, 0x0, 0xffffffff) 06:51:33 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) mmap$snddsp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x200000c, 0x10, r0, 0x0) 06:51:33 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000000)={0x0, 0x0, 0x4, 0xffffffffffffffff}) [ 1295.273079][ T2483] BPF:, vararg [ 1295.275099][ T2491] BPF:return=3 args=( [ 1295.278580][ T2483] BPF:) [ 1295.283977][ T2483] BPF: [ 1295.287049][ T2483] BPF:Invalid return type [ 1295.291734][ T2483] BPF: [ 1295.291734][ T2483] [ 1295.291863][ T2491] BPF:0 (anon) [ 1295.306845][ T2491] BPF:, 0 (anon) [ 1295.314148][ T2491] BPF:, 3 (invalid-name-offset) [ 1295.334130][ T2491] BPF:) [ 1295.343478][ T2491] BPF: [ 1295.352099][ T2491] BPF:Invalid return type [ 1295.365885][ T2491] BPF: [ 1295.365885][ T2491] 06:51:33 executing program 0: rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x5}) 06:51:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000000)) 06:51:33 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x401070c9, 0xffffffffffffffff) [ 1295.389812][ T2502] BPF:[1] FUNC_PROTO (anon) [ 1295.390838][ T2501] BPF:[1] FUNC_PROTO (anon) [ 1295.397026][ T2502] BPF:return=3 args=( [ 1295.404634][ T2502] BPF:0 (anon) [ 1295.409955][ T2502] BPF:, 0 (anon) [ 1295.429149][ T2501] BPF:return=37 args=( [ 1295.433249][ T2501] BPF:0 (anon) [ 1295.444023][ T2501] BPF:, vararg [ 1295.452002][ T2502] BPF:, 3 (invalid-name-offset) [ 1295.461106][ T2501] BPF:) [ 1295.463886][ T2501] BPF: [ 1295.466079][ T2502] BPF:) [ 1295.474950][ T2502] BPF: [ 1295.478597][ T2502] BPF:Invalid return type [ 1295.484131][ T2501] BPF:Invalid return type [ 1295.490610][ T2502] BPF: 06:51:33 executing program 3: r0 = fsopen(&(0x7f0000000000)='virtiofs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000100)='virtiofs\x00', &(0x7f0000000180)="8a", 0x1) [ 1295.490610][ T2502] [ 1295.508292][ T2501] BPF: [ 1295.508292][ T2501] 06:51:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x4, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:33 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockname$l2tp6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @private2}, &(0x7f00000000c0)=0x20) [ 1295.543908][ T2501] BPF:[1] FUNC_PROTO (anon) [ 1295.551093][ T2501] BPF:return=37 args=( [ 1295.555167][ T2501] BPF:0 (anon) [ 1295.581015][ T2515] BPF:[1] FUNC_PROTO (anon) [ 1295.584801][ T2492] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1295.586235][ T2515] BPF:return=4 args=( [ 1295.604375][ T2515] BPF:0 (anon) [ 1295.605224][ T2501] BPF:, vararg [ 1295.609379][ T2515] BPF:, 0 (anon) [ 1295.615210][ T2515] BPF:, 3 (invalid-name-offset) [ 1295.621900][ T2515] BPF:) [ 1295.625041][ T2515] BPF: [ 1295.629003][ T2515] BPF:Invalid return type [ 1295.633936][ T2515] BPF: [ 1295.633936][ T2515] 06:51:33 executing program 5: syz_80211_inject_frame(&(0x7f0000000300)=@device_b, &(0x7f0000000280)=@mgmt_frame=@disassoc={@wo_ht={{0x0, 0x0, 0xa, 0x0, 0x0, 0x1}, {}, @device_b, @device_a, @from_mac=@broadcast, {0x8}}, 0x37, @val={0x8c, 0x10, {0x280, "c2bb5d981457", @short="b2cf18ddfc2d57f8"}}}, 0x2c) 06:51:33 executing program 0: perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 06:51:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x43, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x6c}}, 0x0) 06:51:33 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, 0x0, 0x0) [ 1295.646157][ T2501] BPF:) [ 1295.652380][ T2501] BPF: [ 1295.658407][ T2501] BPF:Invalid return type [ 1295.663392][ T2501] BPF: [ 1295.663392][ T2501] [ 1295.663974][ T2518] BPF:[1] FUNC_PROTO (anon) [ 1295.677569][ T2518] BPF:return=4 args=( [ 1295.681568][ T2518] BPF:0 (anon) [ 1295.685888][ T2518] BPF:, 0 (anon) 06:51:33 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x8, &(0x7f0000002b80), 0x10) [ 1295.718015][ T2518] BPF:, 3 (invalid-name-offset) [ 1295.722923][ T2518] BPF:) [ 1295.742441][ T2524] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1295.757978][ T2518] BPF: [ 1295.760774][ T2518] BPF:Invalid return type [ 1295.765092][ T2518] BPF: [ 1295.765092][ T2518] 06:51:33 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x204480, 0x0) 06:51:33 executing program 3: socketpair(0x15, 0x0, 0x0, &(0x7f0000000380)) 06:51:33 executing program 0: shmget(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 06:51:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x5, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1295.789111][ T2530] BPF:[1] FUNC_PROTO (anon) [ 1295.803672][ T2530] BPF:return=67 args=( [ 1295.809549][ T2530] BPF:0 (anon) [ 1295.853749][ T2530] BPF:, vararg [ 1295.858440][ T2530] BPF:) [ 1295.869716][ T2530] BPF: [ 1295.881553][ T2530] BPF:Invalid return type 06:51:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x5452, 0x0) 06:51:33 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000180), 0x10) [ 1295.901922][ T2530] BPF: [ 1295.901922][ T2530] [ 1295.903421][ T2540] BPF:[1] FUNC_PROTO (anon) [ 1295.918260][ T2540] BPF:return=5 args=( [ 1295.927931][ T2540] BPF:0 (anon) [ 1295.932311][ T2540] BPF:, 0 (anon) [ 1295.936487][ T2540] BPF:, 3 (invalid-name-offset) [ 1295.960162][ T2530] BPF:[1] FUNC_PROTO (anon) [ 1295.962749][ T2540] BPF:) [ 1295.964787][ T2530] BPF:return=67 args=( [ 1295.964798][ T2530] BPF:0 (anon) [ 1295.964804][ T2530] BPF:, vararg [ 1295.964809][ T2530] BPF:) [ 1295.969830][ T2540] BPF: [ 1295.973327][ T2530] BPF: [ 1295.975638][ T2540] BPF:Invalid return type [ 1295.992724][ T2540] BPF: [ 1295.992724][ T2540] [ 1295.997754][ T2530] BPF:Invalid return type [ 1296.006910][ T2545] BPF:[1] FUNC_PROTO (anon) [ 1296.021922][ T2530] BPF: [ 1296.021922][ T2530] [ 1296.034774][ T2545] BPF:return=5 args=( 06:51:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x6, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:33 executing program 5: syz_80211_inject_frame(&(0x7f0000000300)=@device_b, &(0x7f0000000280)=@mgmt_frame=@disassoc={@wo_ht={{0x0, 0x0, 0xa, 0x0, 0x0, 0x1}, {}, @device_b, @device_a, @from_mac=@broadcast, {0x8}}, 0x37, @val={0x8c, 0x10, {0x280, "c2bb5d981457", @short="b2cf18ddfc2d57f8"}}}, 0x2c) 06:51:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\\\x00\x00\b'], 0x5c}}, 0x0) 06:51:33 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, 0x0) 06:51:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000045c0)={0x0, 0x0, &(0x7f0000004500)=[{&(0x7f0000000080)={0xec4, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x4}, @generic="7228e55928b3037b4f698662fc0483129708932d7ff6ede58fbfa17d47c877dfd6fbd7224a1ae80ca39ccb8bd7505529ebe79f3937a56695d59e8f6c763b147762d08591f0c626b2a385bfdf179b4e484d9793718a20dece28ecad950f1167caef7f3fde3243254b342e5bf6fc65f4dc3b3ce6d1c72b78fe888cb08fb1b20e3b956d3e8c342bf6d5abdc707f8f91c794399d8d382aa1a2d98079a33e1781305d2f9cc6d3b0efc3b5f613b9351fbcd1b6b48548d7cb1ed465b7c38ed5f0ebb53d08a54d0a5694ce3d0a130777dd477dd58757475b43b885f7b6c83a41f6b8da", @typed={0x8, 0x0, 0x0, 0x0, @u32=0x2}, @nested={0x25, 0x0, 0x0, 0x1, [@generic="75cf11b0df09b02f0d6950d649ff5c91ed", @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@broadcast}, @typed={0x5, 0x0, 0x0, 0x0, @binary="99"}]}, @generic="52a960e2d0e0cff5629fc8e52bab255a986b0d47c313508375fb91d1bec6983ea1b6f086e06b58c0e6b74f9623c31219685576baf31356c011de703cac1553607dc0b348d1", @typed={0x8, 0x0, 0x0, 0x0, @pid}, @generic="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"]}, 0xec4}, {0x0}], 0x2, 0x0, 0x0, 0x800}, 0x0) 06:51:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x48, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1296.059443][ T2545] BPF:0 (anon) [ 1296.062851][ T2545] BPF:, 0 (anon) [ 1296.066397][ T2545] BPF:, 3 (invalid-name-offset) [ 1296.074779][ T2545] BPF:) [ 1296.079372][ T2545] BPF: [ 1296.082137][ T2545] BPF:Invalid return type [ 1296.086453][ T2545] BPF: [ 1296.086453][ T2545] [ 1296.171177][ T2555] BPF:[1] FUNC_PROTO (anon) [ 1296.172226][ T2559] BPF:[1] FUNC_PROTO (anon) [ 1296.184689][ T2560] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1296.194850][ T2555] BPF:return=72 args=( [ 1296.206695][ T2555] BPF:0 (anon) [ 1296.214745][ T2555] BPF:, vararg 06:51:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x8918, 0x0) 06:51:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000070c0)='devlink\x00', r0) sendmsg$DEVLINK_CMD_GET(r1, &(0x7f0000007200)={&(0x7f0000007080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000071c0)={&(0x7f0000007100)={0x14}, 0x14}}, 0x0) 06:51:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) [ 1296.223044][ T2559] BPF:return=6 args=( [ 1296.247161][ T2555] BPF:) [ 1296.253806][ T2555] BPF: [ 1296.259073][ T2559] BPF:0 (anon) [ 1296.263319][T14319] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1296.264965][ T2555] BPF:Invalid return type [ 1296.281787][ T2559] BPF:, 0 (anon) [ 1296.290108][ T2559] BPF:, 3 (invalid-name-offset) 06:51:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000001900)={0x0, 0x0, &(0x7f0000000500)={0x0, 0x6d690fe19c9a0015}}, 0x0) 06:51:34 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000)=0x6000000, 0x4) 06:51:34 executing program 3: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qrtr-tun\x00', 0x4000) [ 1296.301888][ T2559] BPF:) [ 1296.309337][ T2559] BPF: [ 1296.313330][ T2555] BPF: [ 1296.313330][ T2555] [ 1296.320853][ T2559] BPF:Invalid return type [ 1296.340252][ T2559] BPF: [ 1296.340252][ T2559] [ 1296.356632][ T2569] BPF:[1] FUNC_PROTO (anon) [ 1296.361909][ T2571] BPF:[1] FUNC_PROTO (anon) [ 1296.368442][ T39] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1296.369746][ T2569] BPF:return=72 args=( [ 1296.387252][ T2571] BPF:return=6 args=( [ 1296.403739][ T2571] BPF:0 (anon) [ 1296.412262][ T2571] BPF:, 0 (anon) [ 1296.424135][ T2569] BPF:0 (anon) [ 1296.431008][ T2571] BPF:, 3 (invalid-name-offset) [ 1296.442819][ T2569] BPF:, vararg [ 1296.443882][ T2571] BPF:) [ 1296.450785][ T2571] BPF: [ 1296.453961][ T2571] BPF:Invalid return type [ 1296.459622][ T2569] BPF:) 06:51:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x7, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1296.460759][ T2571] BPF: [ 1296.460759][ T2571] [ 1296.469386][ T2569] BPF: [ 1296.476767][ T2569] BPF:Invalid return type [ 1296.487466][ T2569] BPF: [ 1296.487466][ T2569] 06:51:34 executing program 5: syz_80211_inject_frame(&(0x7f0000000300)=@device_b, &(0x7f0000000280)=@mgmt_frame=@disassoc={@wo_ht={{0x0, 0x0, 0xa, 0x0, 0x0, 0x1}, {}, @device_b, @device_a, @from_mac=@broadcast, {0x8}}, 0x37, @val={0x8c, 0x10, {0x280, "c2bb5d981457", @short="b2cf18ddfc2d57f8"}}}, 0x2c) 06:51:34 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, 0x0, &(0x7f0000004e00)) 06:51:34 executing program 0: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xffffffffffffff01, 0x0) 06:51:34 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0e"], 0x81) 06:51:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x4c, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1296.542703][ T2580] BPF:[1] FUNC_PROTO (anon) [ 1296.547356][ T2580] BPF:return=7 args=( [ 1296.551334][ T2580] BPF:0 (anon) [ 1296.554708][ T2580] BPF:, 0 (anon) [ 1296.561386][ T2580] BPF:, 3 (invalid-name-offset) [ 1296.584240][ T2580] BPF:) [ 1296.594569][ T2580] BPF: [ 1296.607902][ T2580] BPF:Invalid return type [ 1296.620830][ T2588] BPF:[1] FUNC_PROTO (anon) [ 1296.622744][ T2580] BPF: [ 1296.622744][ T2580] 06:51:34 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x0) [ 1296.629155][ T2591] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1296.646126][ T2588] BPF:return=76 args=( [ 1296.656254][ T2588] BPF:0 (anon) [ 1296.665894][ T2588] BPF:, vararg [ 1296.680454][ T2588] BPF:) 06:51:34 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x401870c8, 0xffffffffffffffff) 06:51:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = fsopen(&(0x7f0000001100)='nfs\x00', 0x0) ioctl$LOOP_SET_FD(r0, 0x80081270, r1) [ 1296.681569][ T2592] BPF:[1] FUNC_PROTO (anon) [ 1296.687110][ T2588] BPF: [ 1296.707791][ T2592] BPF:return=7 args=( [ 1296.708395][ T2588] BPF:Invalid return type [ 1296.715887][ T2592] BPF:0 (anon) [ 1296.724397][ T2588] BPF: [ 1296.724397][ T2588] 06:51:34 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000100)=@req={0x28, &(0x7f00000000c0)={'dummy0\x00', @ifru_names}}) [ 1296.741572][ T2592] BPF:, 0 (anon) [ 1296.748826][ T2599] BPF:[1] FUNC_PROTO (anon) [ 1296.759334][ T2592] BPF:, 3 (invalid-name-offset) [ 1296.760999][ T2599] BPF:return=76 args=( 06:51:34 executing program 3: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) fork() 06:51:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002ec0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000002f80)) [ 1296.790368][ T2592] BPF:) [ 1296.793137][ T2599] BPF:0 (anon) [ 1296.801752][ T2592] BPF: [ 1296.809203][ T2592] BPF:Invalid return type [ 1296.813281][ T2599] BPF:, vararg [ 1296.814145][ T2592] BPF: [ 1296.814145][ T2592] [ 1296.825279][ T2599] BPF:) 06:51:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x8, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1296.840201][ T2599] BPF: [ 1296.853651][ T2599] BPF:Invalid return type [ 1296.880351][ T2599] BPF: [ 1296.880351][ T2599] [ 1296.913244][ T2611] BPF:[1] FUNC_PROTO (anon) [ 1296.919764][ T2611] BPF:return=8 args=( [ 1296.924099][ T2611] BPF:0 (anon) [ 1296.929102][ T2611] BPF:, 0 (anon) [ 1296.932776][ T2611] BPF:, 3 (invalid-name-offset) [ 1296.939891][ T2611] BPF:) [ 1296.942800][ T2611] BPF: [ 1296.945629][ T2611] BPF:Invalid return type [ 1296.952249][ T2611] BPF: [ 1296.952249][ T2611] 06:51:34 executing program 5: syz_80211_inject_frame(0x0, &(0x7f0000000280)=@mgmt_frame=@disassoc={@wo_ht={{0x0, 0x0, 0xa, 0x0, 0x0, 0x1}, {}, @device_b, @device_a, @from_mac=@broadcast, {0x8}}, 0x37, @val={0x8c, 0x10, {0x280, "c2bb5d981457", @short="b2cf18ddfc2d57f8"}}}, 0x2c) 06:51:34 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f00000014c0)='./file0\x00', 0x40, 0x0) 06:51:34 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, 0x0, 0x0) 06:51:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x60, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1296.969212][ T2612] BPF:[1] FUNC_PROTO (anon) [ 1296.974223][ T2612] BPF:return=8 args=( [ 1296.986974][ T2612] BPF:0 (anon) [ 1296.995116][ T2612] BPF:, 0 (anon) [ 1296.999553][ T2612] BPF:, 3 (invalid-name-offset) [ 1297.023344][ T2612] BPF:) [ 1297.034072][ T2612] BPF: [ 1297.043157][ T2612] BPF:Invalid return type [ 1297.054074][ T2612] BPF: [ 1297.054074][ T2612] [ 1297.059321][ T2620] BPF:[1] FUNC_PROTO (anon) 06:51:34 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f00000051c0)) [ 1297.075360][ T2619] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1297.075863][ T2620] BPF:return=96 args=( [ 1297.109539][ T2620] BPF:0 (anon) 06:51:34 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) 06:51:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x9, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1297.125548][ T2620] BPF:, vararg [ 1297.140149][ T2620] BPF:) [ 1297.152161][ T2620] BPF: [ 1297.162079][ T2620] BPF:Invalid return type 06:51:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 06:51:35 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x14, 0x0, 0x0) [ 1297.177788][ T2620] BPF: [ 1297.177788][ T2620] [ 1297.190819][ T2630] BPF:[1] FUNC_PROTO (anon) [ 1297.203255][ T2630] BPF:return=9 args=( [ 1297.211166][ T2633] BPF:[1] FUNC_PROTO (anon) [ 1297.216862][ T2633] BPF:return=96 args=( [ 1297.221254][ T2633] BPF:0 (anon) [ 1297.222935][ T2630] BPF:0 (anon) [ 1297.230394][ T2633] BPF:, vararg [ 1297.236066][ T2630] BPF:, 0 (anon) [ 1297.243190][ T2630] BPF:, 3 (invalid-name-offset) [ 1297.250762][ T2633] BPF:) [ 1297.254259][ T2630] BPF:) [ 1297.261847][ T2630] BPF: [ 1297.268523][ T2630] BPF:Invalid return type [ 1297.275369][ T2633] BPF: 06:51:35 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000000c0)) [ 1297.281739][ T2633] BPF:Invalid return type [ 1297.286247][ T2630] BPF: [ 1297.286247][ T2630] [ 1297.299643][ T2633] BPF: [ 1297.299643][ T2633] [ 1297.313164][ T2640] BPF:[1] FUNC_PROTO (anon) [ 1297.320362][ T2640] BPF:return=9 args=( [ 1297.324848][ T2640] BPF:0 (anon) [ 1297.328667][ T2640] BPF:, 0 (anon) [ 1297.332482][ T2640] BPF:, 3 (invalid-name-offset) [ 1297.338141][ T2640] BPF:) [ 1297.341635][ T2640] BPF: [ 1297.355984][ T2640] BPF:Invalid return type [ 1297.379396][ T2640] BPF: [ 1297.379396][ T2640] 06:51:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000840)={0x0, @qipcrtr, @sco, @ax25={0x3, @default, 0x6}}) 06:51:35 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKFRASET(r0, 0x1264, 0x0) 06:51:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x68, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:35 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x5, 0x0, 0x0) 06:51:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xa, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:35 executing program 5: syz_80211_inject_frame(0x0, &(0x7f0000000280)=@mgmt_frame=@disassoc={@wo_ht={{0x0, 0x0, 0xa, 0x0, 0x0, 0x1}, {}, @device_b, @device_a, @from_mac=@broadcast, {0x8}}, 0x37, @val={0x8c, 0x10, {0x280, "c2bb5d981457", @short="b2cf18ddfc2d57f8"}}}, 0x2c) 06:51:35 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = fsopen(&(0x7f0000001100)='nfs\x00', 0x0) ioctl$LOOP_SET_FD(r0, 0x2, r1) [ 1297.754686][ T2656] BPF:[1] FUNC_PROTO (anon) [ 1297.762665][ T2652] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1297.763481][ T2657] BPF:[1] FUNC_PROTO (anon) [ 1297.779852][ T2656] BPF:return=104 args=( [ 1297.787892][ T2656] BPF:0 (anon) [ 1297.795936][ T2656] BPF:, vararg 06:51:35 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) read$char_raw(r0, &(0x7f0000000200)={""/54557}, 0xd600) 06:51:35 executing program 0: r0 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8982, &(0x7f0000002980)) fork() [ 1297.805062][ T2656] BPF:) [ 1297.812642][ T2656] BPF: [ 1297.821252][ T2656] BPF:Invalid return type [ 1297.831555][ T2657] BPF:return=10 args=( [ 1297.845256][ T2657] BPF:0 (anon) 06:51:35 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), 0x4) [ 1297.854510][ T2656] BPF: [ 1297.854510][ T2656] [ 1297.855764][ T2657] BPF:, 0 (anon) [ 1297.872293][ T2657] BPF:, 3 (invalid-name-offset) [ 1297.881974][ T2670] BPF:[1] FUNC_PROTO (anon) [ 1297.895949][ T2657] BPF:) 06:51:35 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self\x00', 0x0, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) 06:51:35 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcs\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) [ 1297.904885][ T2670] BPF:return=104 args=( [ 1297.915883][ T2657] BPF: [ 1297.936803][ T2670] BPF:0 (anon) [ 1297.942742][ T2657] BPF:Invalid return type 06:51:35 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8}]}) [ 1297.957316][ T2670] BPF:, vararg [ 1297.965443][ T2657] BPF: [ 1297.965443][ T2657] [ 1297.979432][ T2670] BPF:) [ 1297.989597][ T2670] BPF: [ 1298.002126][ T2682] BPF:[1] FUNC_PROTO (anon) 06:51:35 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x20142) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f00000007c0)) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x20142) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, 0xffffffffffffffff) waitid$P_PIDFD(0x2, r2, 0x0, 0x1000000, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f00000007c0)) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0xffffffff7fffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0], 0x2}) sendmsg$SMC_PNETID_FLUSH(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, 0x0, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ipvlan1\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0xa6}, 0x800) [ 1298.007069][ T2670] BPF:Invalid return type [ 1298.022035][ T2670] BPF: [ 1298.022035][ T2670] [ 1298.031072][ T2682] BPF:return=10 args=( [ 1298.050178][ T2682] BPF:0 (anon) 06:51:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x6c, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:35 executing program 1: openat$cachefiles(0xffffffffffffff9c, 0x0, 0x92ec1, 0x0) [ 1298.060762][ T2682] BPF:, 0 (anon) [ 1298.073649][ T2682] BPF:, 3 (invalid-name-offset) [ 1298.088413][ T2682] BPF:) [ 1298.116934][ T2682] BPF: [ 1298.124603][ T2682] BPF:Invalid return type [ 1298.136280][ T2682] BPF: [ 1298.136280][ T2682] [ 1298.144464][ T2694] BPF:[1] FUNC_PROTO (anon) [ 1298.154291][ T2694] BPF:return=108 args=( 06:51:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xb, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:35 executing program 3: mq_unlink(&(0x7f00000000c0)='+[\\\x00') 06:51:35 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0xe, &(0x7f0000002b80), 0x10) 06:51:35 executing program 5: syz_80211_inject_frame(0x0, &(0x7f0000000280)=@mgmt_frame=@disassoc={@wo_ht={{0x0, 0x0, 0xa, 0x0, 0x0, 0x1}, {}, @device_b, @device_a, @from_mac=@broadcast, {0x8}}, 0x37, @val={0x8c, 0x10, {0x280, "c2bb5d981457", @short="b2cf18ddfc2d57f8"}}}, 0x2c) 06:51:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) [ 1298.164497][ T2694] BPF:0 (anon) [ 1298.172808][ T2694] BPF:, vararg [ 1298.177059][ T2694] BPF:) [ 1298.185034][ T2694] BPF: 06:51:36 executing program 0: r0 = getpgid(0x0) capget(&(0x7f0000002640)={0x20080522, r0}, &(0x7f0000002680)) [ 1298.212402][ T2694] BPF:Invalid return type [ 1298.231347][ T2694] BPF: [ 1298.231347][ T2694] [ 1298.239336][ T2695] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 06:51:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 1298.258985][ T2705] BPF:[1] FUNC_PROTO (anon) [ 1298.264491][ T2706] BPF:[1] FUNC_PROTO (anon) [ 1298.270996][ T2705] BPF:return=11 args=( [ 1298.275487][ T2706] BPF:return=108 args=( [ 1298.281662][ T2705] BPF:0 (anon) [ 1298.285894][ T2706] BPF:0 (anon) [ 1298.290672][ T2705] BPF:, 0 (anon) [ 1298.294647][ T2706] BPF:, vararg [ 1298.299984][ T2705] BPF:, 3 (invalid-name-offset) [ 1298.306994][ T2706] BPF:) 06:51:36 executing program 1: add_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='E', 0x1, 0xfffffffffffffffc) [ 1298.322368][ T2706] BPF: [ 1298.326440][ T2705] BPF:) [ 1298.333684][ T2706] BPF:Invalid return type [ 1298.339676][ T2705] BPF: [ 1298.348848][ T2705] BPF:Invalid return type [ 1298.355516][ T2706] BPF: [ 1298.355516][ T2706] 06:51:36 executing program 0: keyctl$dh_compute(0x17, &(0x7f0000000180), &(0x7f00000001c0)=""/65, 0x41, &(0x7f00000002c0)={&(0x7f0000000240)={'xcbc-aes-neon\x00'}, &(0x7f0000000280)}) shmctl$IPC_STAT(0xffffffffffffffff, 0x2, 0x0) ioctl$SIOCX25GDTEFACILITIES(0xffffffffffffffff, 0x89ea, 0x0) [ 1298.375009][ T2705] BPF: [ 1298.375009][ T2705] 06:51:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x74, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:36 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@loopback, @empty, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x220}) 06:51:36 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x6011, r0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0x0, 0x0, r0, 0xb) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) [ 1298.411443][ T2715] BPF:[1] FUNC_PROTO (anon) [ 1298.422089][ T2715] BPF:return=11 args=( [ 1298.427889][ T2715] BPF:0 (anon) [ 1298.432551][ T2715] BPF:, 0 (anon) [ 1298.437413][ T2715] BPF:, 3 (invalid-name-offset) [ 1298.442608][ T2715] BPF:) [ 1298.445705][ T2715] BPF: [ 1298.449494][ T2715] BPF:Invalid return type 06:51:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xc, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1298.479008][ T2715] BPF: [ 1298.479008][ T2715] [ 1298.491671][ T2724] BPF:[1] FUNC_PROTO (anon) [ 1298.503569][ T2724] BPF:return=116 args=( [ 1298.515893][ T2724] BPF:0 (anon) 06:51:36 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000002680)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000600)=[{&(0x7f0000000080)="da", 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x50) [ 1298.528262][ T2724] BPF:, vararg [ 1298.534225][ T2724] BPF:) [ 1298.544534][ T2719] could not allocate digest TFM handle xcbc-aes-neon [ 1298.553101][ T2724] BPF: [ 1298.562260][ T2724] BPF:Invalid return type 06:51:36 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) syz_io_uring_setup(0x4889, &(0x7f0000000400)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 06:51:36 executing program 5: syz_80211_inject_frame(&(0x7f0000000300)=@device_b, 0x0, 0x0) [ 1298.593979][ T2724] BPF: [ 1298.593979][ T2724] [ 1298.609399][ T2738] BPF:[1] FUNC_PROTO (anon) [ 1298.622087][ T2719] could not allocate digest TFM handle xcbc-aes-neon [ 1298.626186][ T2738] BPF:return=12 args=( 06:51:36 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@empty, @dev={0xfe, 0x80, [], 0x14}, @remote, 0x6, 0x9, 0x7, 0x800, 0x0, 0x200220, r1}) [ 1298.645809][ T2738] BPF:0 (anon) [ 1298.658521][ T2749] BPF:[1] FUNC_PROTO (anon) [ 1298.666602][ T2738] BPF:, 0 (anon) [ 1298.675087][ T2749] BPF:return=116 args=( [ 1298.680284][ T2738] BPF:, 3 (invalid-name-offset) 06:51:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000a003b3c8e"], 0x20}}, 0x0) 06:51:36 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x2) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000080)) [ 1298.693620][ T2752] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1298.706398][ T2749] BPF:0 (anon) [ 1298.713833][ T2738] BPF:) [ 1298.724653][ T2749] BPF:, vararg [ 1298.730516][ T2738] BPF: [ 1298.742314][ T2749] BPF:) [ 1298.747058][ T2761] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1298.755088][ T2738] BPF:Invalid return type [ 1298.770746][ T2749] BPF: [ 1298.775741][ T2763] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1298.785013][ T2749] BPF:Invalid return type [ 1298.788113][ T2738] BPF: [ 1298.788113][ T2738] 06:51:36 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000a00)='802.15.4 MAC\x00', 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000c00)='802.15.4 MAC\x00', r0) sendmsg$IEEE802154_DISASSOCIATE_REQ(r1, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={0x0}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 06:51:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_MODE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) [ 1298.803559][ T2766] BPF:[1] FUNC_PROTO (anon) [ 1298.806619][ T2749] BPF: [ 1298.806619][ T2749] [ 1298.819185][ T2766] BPF:return=12 args=( [ 1298.830030][ T2766] BPF:0 (anon) [ 1298.844188][ T2766] BPF:, 0 (anon) 06:51:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x7a, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:36 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_MODE(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x30}}, 0x0) [ 1298.855579][ T2766] BPF:, 3 (invalid-name-offset) [ 1298.868705][ T2766] BPF:) [ 1298.876013][ T2766] BPF: [ 1298.894523][ T2766] BPF:Invalid return type [ 1298.907511][ T2766] BPF: [ 1298.907511][ T2766] 06:51:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00', 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="030226bd7000ffdbdf2502000000080001"], 0x5c}}, 0x0) 06:51:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xd, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:36 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001600)={'team0\x00'}) 06:51:36 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x1) [ 1298.946237][ T2782] BPF:[1] FUNC_PROTO (anon) [ 1298.966040][ T2782] BPF:return=122 args=( [ 1299.003493][ T2782] BPF:0 (anon) [ 1299.007045][ T2788] BPF:[1] FUNC_PROTO (anon) [ 1299.011933][ T2788] BPF:return=13 args=( [ 1299.018562][ T2788] BPF:0 (anon) [ 1299.018668][ T2782] BPF:, vararg [ 1299.022847][ T2788] BPF:, 0 (anon) [ 1299.033092][ T2789] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1299.037135][ T2782] BPF:) 06:51:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x34, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "ae7d9f9f3649d4625df257ea8f"}]}, 0x34}}, 0x0) 06:51:36 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x1) 06:51:36 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f00000013c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) [ 1299.063203][ T2782] BPF: [ 1299.066587][ T2788] BPF:, 3 (invalid-name-offset) [ 1299.072453][ T2788] BPF:) [ 1299.083058][ T2782] BPF:Invalid return type [ 1299.088298][ T2788] BPF: [ 1299.091264][ T2788] BPF:Invalid return type [ 1299.098324][ T2788] BPF: [ 1299.098324][ T2788] [ 1299.103773][ T2794] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1299.119313][ T2797] BPF:[1] FUNC_PROTO (anon) [ 1299.123546][ T2782] BPF: [ 1299.123546][ T2782] [ 1299.128338][ T2797] BPF:return=13 args=( [ 1299.156993][ T2806] BPF:[1] FUNC_PROTO (anon) [ 1299.163617][ T2797] BPF:0 (anon) 06:51:36 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x101400, 0x0) read$alg(r0, &(0x7f0000000100)=""/90, 0x5a) 06:51:37 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x1) 06:51:37 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003e80)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x0) [ 1299.180142][ T2806] BPF:return=122 args=( [ 1299.181101][ T2797] BPF:, 0 (anon) [ 1299.211826][ T2797] BPF:, 3 (invalid-name-offset) [ 1299.222341][ T2806] BPF:0 (anon) [ 1299.228797][ T2797] BPF:) [ 1299.239292][ T2797] BPF: [ 1299.242252][ T2806] BPF:, vararg [ 1299.242342][ T2797] BPF:Invalid return type [ 1299.256112][ T2806] BPF:) [ 1299.267454][ T2806] BPF: [ 1299.273922][ T2806] BPF:Invalid return type [ 1299.275252][ T2797] BPF: [ 1299.275252][ T2797] [ 1299.284158][ T2806] BPF: [ 1299.284158][ T2806] 06:51:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xa0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:37 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 06:51:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x0, @loopback}], 0x10) 06:51:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xe, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:37 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x1) 06:51:37 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f00000000c0)={0x0, 0x1, 0x0, "608dbb56639a033f4dcb17510c6e6a5584192fd3929eedad82c6bf6a7f5d6bf2"}) 06:51:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000004c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="352728bd7000fedb000008"], 0x24}}, 0x0) 06:51:37 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@dev, @dev, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa80122}) 06:51:37 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003e80)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote, 0x100}, 0x1c, 0x0, 0x0, &(0x7f0000001400)=[@dontfrag={{0x14}}, @dstopts_2292={{0x18}}, @hoplimit_2292={{0x14}}], 0x48}}], 0x1, 0x0) [ 1299.424535][ T2828] BPF:[1] FUNC_PROTO (anon) [ 1299.432605][ T2828] BPF:return=14 args=( [ 1299.448096][ T2829] BPF:[1] FUNC_PROTO (anon) [ 1299.467773][ T2828] BPF:0 (anon) 06:51:37 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000180)=0x4) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@remote, @remote, @remote, 0x0, 0x0, 0x0, 0xd00, 0x4, 0x84a802a9}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/full\x00', 0x309403, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r1, 0x0, 0x0) recvmsg$can_bcm(r1, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/12, 0xc}], 0x1, &(0x7f0000000780)=""/4084, 0xff4}, 0x40000002) [ 1299.484041][ T2828] BPF:, 0 (anon) [ 1299.493349][ T2828] BPF:, 3 (invalid-name-offset) [ 1299.494650][ T2829] BPF:return=160 args=( [ 1299.513853][ T2829] BPF:0 (anon) [ 1299.525407][ T2828] BPF:) [ 1299.532330][ T2829] BPF:, vararg [ 1299.541804][ T2828] BPF: [ 1299.553405][ T2828] BPF:Invalid return type [ 1299.556767][ T2829] BPF:) [ 1299.572563][ T2829] BPF: [ 1299.575179][ T2828] BPF: [ 1299.575179][ T2828] 06:51:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000c00)='802.15.4 MAC\x00', r0) 06:51:37 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002b00)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @loopback, 0x7}, 0x1c, 0x0}}], 0x1, 0x0) [ 1299.583874][ T2829] BPF:Invalid return type [ 1299.598414][ T2829] BPF: [ 1299.598414][ T2829] [ 1299.629073][ T2849] BPF:[1] FUNC_PROTO (anon) [ 1299.633339][ T2851] BPF:[1] FUNC_PROTO (anon) [ 1299.638940][ T2851] BPF:return=160 args=( [ 1299.642370][ T2849] BPF:return=14 args=( [ 1299.643783][ T2851] BPF:0 (anon) [ 1299.651704][ T2851] BPF:, vararg [ 1299.660118][ T2849] BPF:0 (anon) [ 1299.666918][ T2851] BPF:) [ 1299.668482][ T2849] BPF:, 0 (anon) [ 1299.675806][ T2849] BPF:, 3 (invalid-name-offset) [ 1299.679985][ T2851] BPF: [ 1299.688260][ T2851] BPF:Invalid return type [ 1299.700736][ T2849] BPF:) [ 1299.707135][ T2849] BPF: [ 1299.708324][ T2851] BPF: [ 1299.708324][ T2851] [ 1299.713642][ T2849] BPF:Invalid return type 06:51:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x300, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:37 executing program 1: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:51:37 executing program 0: r0 = socket$inet6_sctp(0xa, 0x2, 0x73) sendmmsg$sock(r0, &(0x7f0000004dc0)=[{{&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}, 0x80000000}, 0x80, 0x0}}], 0x1, 0x0) 06:51:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xf, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:37 executing program 3: syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x5, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2f802980, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) read$FUSE(0xffffffffffffffff, &(0x7f00000006c0)={0x2020}, 0x2020) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)={0x0, 0x0, "f415f4"}) sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x208}, 0x0) 06:51:37 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@dev, @ipv4={[], [], @empty}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x220}) [ 1299.728097][ T2849] BPF: [ 1299.728097][ T2849] [ 1299.795387][ T2870] BPF:[1] FUNC_PROTO (anon) 06:51:37 executing program 0: process_vm_writev(0x0, &(0x7f0000001140)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001780)=[{&(0x7f0000001180)=""/174, 0xae}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 06:51:37 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_MODE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x24}}, 0x0) 06:51:37 executing program 5: syz_read_part_table(0x6, 0x4, &(0x7f00000008c0)=[{&(0x7f0000000140)="7f11d709f3c1a4e2ac8b38ce3da295d212a14ec3258c2b2c28652d9313782a00497d92d54187a117c9ca8202b5d6d7779cda450ca81c558ba0b0fb24cafb624ca59750e0b4cf3b760ca9449a826a59605c73668c9d4b940dc599a84ab48849f2e85c2d", 0x63, 0x4}, {0x0}, {&(0x7f00000003c0)="94962a3b635d06578f7cd9bf38df397a71dadef14190bd1d9a2e08c0906fa2d0286ebed84c93a73b854dcf10782ccc0d63bc058c0b78b6e9a5a659856a6ca4c7fbfd0aad376eb872f88b2aadf7fa58164b5b4e1cf6dcda7d0340", 0x5a, 0x401}, {0x0, 0x0, 0x8}]) [ 1299.818381][ T2870] BPF:return=768 args=( [ 1299.838291][ T2870] BPF:0 (anon) [ 1299.848583][ T2870] BPF:, vararg [ 1299.854226][ T2870] BPF:) [ 1299.858957][ T2880] BPF:[1] FUNC_PROTO (anon) 06:51:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000340)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @empty}}}, 0x90) [ 1299.875597][ T2880] BPF:return=15 args=( [ 1299.879065][ T2870] BPF: [ 1299.889865][ T2870] BPF:Invalid return type [ 1299.890417][ T2880] BPF:0 (anon) [ 1299.909501][ T2891] loop5: detected capacity change from 0 to 4 [ 1299.912739][ T2870] BPF: [ 1299.912739][ T2870] [ 1299.919695][ T2880] BPF:, 0 (anon) 06:51:37 executing program 0: syz_open_dev$sg(0x0, 0x0, 0x688543) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) syz_read_part_table(0x6, 0x2, &(0x7f0000000500)=[{&(0x7f0000000140)="792d91ef2f015899d17e4e212792197fb05592c677feb6bcc9e0bc66771c84e2bd844073db21bf747f781e9425bccbe8af834f127316fe216647fcdc2dc633bfe549b73b953a5fb3c28f22361dbf25f5ae7ec0bf64371ea4b3613db11cfd7910550d8a1983e369a3d66efdb2487e027d6a133c16e5a451e0e2b4bd7612f047bc677858bd9498d375ea0c4f59ff67c3eaa278b73cb92f900798aeb1faee34411b8bee01faa3c57277d23448aee6efa3096e8f06c093cbeef7147c81614b83c0b1605c4d72cba8d1af1b", 0xc9, 0xbc28}, {0x0}]) [ 1299.927039][ T2880] BPF:, 3 (invalid-name-offset) [ 1299.946847][ T2897] BPF:[1] FUNC_PROTO (anon) [ 1299.954830][ T2880] BPF:) [ 1299.966962][ T2891] Dev loop5: unable to read RDB block 4 [ 1299.967019][ T2880] BPF: 06:51:37 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x7fff, 0x1, &(0x7f0000001bc0)=[{0x0}]) [ 1299.973060][ T2891] loop5: unable to read partition table [ 1299.982046][ T2897] BPF:return=768 args=( [ 1299.983861][ T2891] loop5: partition table beyond EOD, truncated [ 1299.993622][ T2891] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 1300.007935][ T2897] BPF:0 (anon) [ 1300.012817][ T2880] BPF:Invalid return type [ 1300.023587][ T2897] BPF:, vararg [ 1300.028038][ T2897] BPF:) [ 1300.031243][ T2897] BPF: [ 1300.034482][ T2897] BPF:Invalid return type [ 1300.039877][ T2880] BPF: [ 1300.039877][ T2880] [ 1300.040955][ T2897] BPF: [ 1300.040955][ T2897] [ 1300.060559][ T2891] loop5: detected capacity change from 0 to 4 06:51:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x500, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@empty, @dev, @remote, 0x0, 0x9, 0x7, 0x800, 0x0, 0x200220}) 06:51:37 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f00000001c0)='/dev/video#\x00', 0xff, 0x2) ioctl$vim2m_VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000340)={0x1, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) [ 1300.079251][ T2911] BPF:[1] FUNC_PROTO (anon) [ 1300.087756][ T2911] BPF:return=15 args=( [ 1300.092225][ T2911] BPF:0 (anon) [ 1300.096293][ T2911] BPF:, 0 (anon) [ 1300.101139][ T2911] BPF:, 3 (invalid-name-offset) [ 1300.108048][ T2891] Dev loop5: unable to read RDB block 4 [ 1300.113882][ T2891] loop5: unable to read partition table [ 1300.120362][ T2891] loop5: partition table beyond EOD, truncated [ 1300.124277][ T2911] BPF:) 06:51:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x10, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:37 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r1, 0x101, 0x4, &(0x7f0000000c40), &(0x7f0000000040)=0x4) [ 1300.127383][ T2891] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 1300.138242][ T2911] BPF: [ 1300.141302][ T2911] BPF:Invalid return type [ 1300.145992][ T2911] BPF: [ 1300.145992][ T2911] 06:51:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="11000000", @ANYRES16=r1, @ANYBLOB='A'], 0x20}}, 0x0) [ 1300.189389][ T2921] BPF:[1] FUNC_PROTO (anon) 06:51:38 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dlm_plock\x00', 0x101100, 0x0) 06:51:38 executing program 0: syz_read_part_table(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100)='ethtool\x00', 0xffffffffffffffff) [ 1300.224882][ T2921] BPF:return=1280 args=( [ 1300.235264][ T2926] BPF:[1] FUNC_PROTO (anon) [ 1300.240165][ T2926] BPF:return=16 args=( [ 1300.244564][ T2926] BPF:0 (anon) [ 1300.252966][ T2921] BPF:0 (anon) [ 1300.269158][ T2921] BPF:, vararg 06:51:38 executing program 1: r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0xa, 0x8, 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') [ 1300.282615][ T2921] BPF:) [ 1300.288138][ T2926] BPF:, 0 (anon) [ 1300.295830][ T2921] BPF: [ 1300.301240][ T2926] BPF:, 3 (invalid-name-offset) [ 1300.309104][ T2921] BPF:Invalid return type [ 1300.317617][ T2926] BPF:) 06:51:38 executing program 0: syz_read_part_table(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100)='ethtool\x00', 0xffffffffffffffff) 06:51:38 executing program 5: syz_read_part_table(0x0, 0x4, &(0x7f0000001bc0)=[{&(0x7f00000009c0), 0x0, 0x4}, {&(0x7f0000000a00), 0x0, 0x8}, {0x0, 0x0, 0xffff}, {&(0x7f0000000bc0)="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", 0x1e4, 0x8}]) [ 1300.330686][ T2926] BPF: [ 1300.335069][ T2921] BPF: [ 1300.335069][ T2921] [ 1300.341990][ T2926] BPF:Invalid return type [ 1300.362691][ T2926] BPF: [ 1300.362691][ T2926] [ 1300.365028][ T2940] BPF:[1] FUNC_PROTO (anon) 06:51:38 executing program 3: keyctl$dh_compute(0x17, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={'xcbc-aes-neon\x00'}}) [ 1300.383754][ T2940] BPF:return=1280 args=( [ 1300.395065][ T2940] BPF:0 (anon) [ 1300.401246][ T2940] BPF:, vararg [ 1300.410905][ T2940] BPF:) [ 1300.419922][ T2940] BPF: [ 1300.427860][ T2945] BPF:[1] FUNC_PROTO (anon) [ 1300.432796][ T2945] BPF:return=16 args=( [ 1300.433440][ T2940] BPF:Invalid return type [ 1300.444580][ T2945] BPF:0 (anon) [ 1300.456587][ T2945] BPF:, 0 (anon) [ 1300.459228][ T2940] BPF: [ 1300.459228][ T2940] [ 1300.464820][ T2945] BPF:, 3 (invalid-name-offset) [ 1300.465656][ T2948] loop5: detected capacity change from 0 to 255 06:51:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x600, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:38 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000002680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 06:51:38 executing program 0: syz_read_part_table(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100)='ethtool\x00', 0xffffffffffffffff) [ 1300.483413][ T2945] BPF:) [ 1300.492284][ T2945] BPF: [ 1300.499299][ T2945] BPF:Invalid return type [ 1300.512324][ T2945] BPF: [ 1300.512324][ T2945] 06:51:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x11, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1300.562531][ T2948] loop5: detected capacity change from 0 to 255 [ 1300.582571][ T2950] could not allocate digest TFM handle xcbc-aes-neon 06:51:38 executing program 0: syz_read_part_table(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100)='ethtool\x00', 0xffffffffffffffff) [ 1300.643363][ T2973] BPF:[1] FUNC_PROTO (anon) [ 1300.647359][ T2950] could not allocate digest TFM handle xcbc-aes-neon [ 1300.648181][ T2973] BPF:return=1536 args=( [ 1300.659060][ T2973] BPF:0 (anon) [ 1300.662434][ T2973] BPF:, vararg [ 1300.665820][ T2973] BPF:) [ 1300.668816][ T2973] BPF: [ 1300.671577][ T2973] BPF:Invalid return type [ 1300.675967][ T2973] BPF: [ 1300.675967][ T2973] [ 1300.683353][ T2974] BPF:[1] FUNC_PROTO (anon) [ 1300.688048][ T2974] BPF:return=1536 args=( 06:51:38 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) [ 1300.692287][ T2974] BPF:0 (anon) [ 1300.695650][ T2974] BPF:, vararg [ 1300.699092][ T2974] BPF:) [ 1300.701857][ T2974] BPF: [ 1300.704681][ T2974] BPF:Invalid return type [ 1300.713108][ T2974] BPF: [ 1300.713108][ T2974] 06:51:38 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000100), 0x8) 06:51:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x700, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:38 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@dev={0xfe, 0x80, [], 0xe}, @ipv4={[], [], @empty}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x0, 0x500, 0x0, 0x220}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000580)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000005c0)={@private1={0xfc, 0x1, [], 0x1}, 0x3a, r1}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/full\x00', 0x309403, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/full\x00', 0x309403, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r3, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700)='batadv\x00', r4) sendmsg$BATADV_CMD_GET_DAT_CACHE(r4, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x28400}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x1c, r5, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r5, 0x785, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000800) sendmsg$BATADV_CMD_SET_VLAN(r2, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/full\x00', 0x200603, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r7, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x58, r5, 0x10, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xa0000}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x858}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) sendmsg$BATADV_CMD_SET_VLAN(r6, 0x0, 0x0) getsockopt$inet6_opts(r6, 0x29, 0x36, &(0x7f0000000780)=""/4096, &(0x7f0000000000)=0x1000) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/full\x00', 0x309403, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r8, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xf, 0x3, 0x9, 0x2, 0x40, r2, 0x3, [], 0x0, r8, 0x0, 0x3, 0x3}, 0x40) [ 1300.751613][ T2979] BPF:[1] FUNC_PROTO (anon) [ 1300.756237][ T2979] BPF:return=17 args=( [ 1300.773437][ T2979] BPF:0 (anon) 06:51:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000037c0)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty, 0x1f}, 0x1c, 0x0, 0x0, &(0x7f00000000c0)=[@hopopts={{0x18}}, @rthdr={{0x18}}], 0x30}}], 0x1, 0x0) [ 1300.794498][ T2979] BPF:, 0 (anon) [ 1300.803575][ T2979] BPF:, 3 (invalid-name-offset) [ 1300.822287][ T2979] BPF:) [ 1300.835682][ T2979] BPF: 06:51:38 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000001bc0)=[{0x0, 0x0, 0xffff}, {&(0x7f0000000bc0)="cd994c3c35ffbfe974cf05c9eaef1d1bf489ec2d9e588688f44bf3d915309b0da7c1e4546c12850a27482c2f06c879e8c57c57dab5ec874dc3ad3d7c8cba4343a026677cd555e24c89a7de55886a0157592af7c0cc41f7532af9bb2b1c20dc59ec74e7316029c18feada4044977abbb3d62c7de1b4549d140d8af43287f784f330eccd78b2a1e1f9dc581929c9aef78470369eab45572dc94f16e9fa0e3b47a337a8c1b11fbe9f7f28a9c4dcac152db677b898982ee3a2078b8564e6e78f02a557b3f425d8ef3fcf52797dbd3aa640572aa5275f0e3221b4828d866a1df2d268f81167905a33bba4341f775dd2643930b6decb705a564a7bb36cf382f20f61d84cd1b6b5daec4dedbca4e1adc2d1d7a65c3e41dd2470e6ba11bcac7aa10c9aa2ea193300eeb9bb12ade7813dc4d637201f1bc9987c8742c29af0371e8de67fb45a88a12bf1b00d6e7c7101104475ccefb1ebfd699472da9dffc5354c06f8aeaa1c7e434d0c1013cb4ef3ebb3952cfd4b3d6b46b3eac19938ab40dc0b6ad78e8af868252b2fd8ba6b97eefef1a03686d0e1e0c44a70b65e7ac342a0f527a857600f0fb3a276f3644e8a1a48b35fd784929ae62d5a8ffc20111390d10b9029f078129e2c2542064d", 0x1c7}]) 06:51:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd, 0x1, 'fq_codel\x00'}, {0xc, 0x2, [@TCA_FQ_CODEL_LIMIT={0x8}]}}]}, 0x40}}, 0x0) 06:51:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000070c0)='devlink\x00', r0) sendmsg$DEVLINK_CMD_GET(r1, &(0x7f0000007200)={0x0, 0x0, &(0x7f00000071c0)={&(0x7f0000007100)={0x14}, 0x14}}, 0x0) [ 1300.854031][ T2993] BPF:[1] FUNC_PROTO (anon) [ 1300.862231][ T2979] BPF:Invalid return type [ 1300.872872][ T2993] BPF:return=1792 args=( [ 1300.880010][ T2979] BPF: [ 1300.880010][ T2979] 06:51:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000004c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="352728bd7000fedbdf25060001d621"], 0x24}}, 0x0) [ 1300.904587][ T2993] BPF:0 (anon) [ 1300.919521][ T2993] BPF:, vararg [ 1300.923330][ T3002] BPF:[1] FUNC_PROTO (anon) [ 1300.935632][ T3002] BPF:return=17 args=( [ 1300.937399][ T2993] BPF:) [ 1300.949970][ T2993] BPF: 06:51:38 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dlm_plock\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) [ 1300.958729][ T2993] BPF:Invalid return type [ 1300.969345][ T3002] BPF:0 (anon) [ 1300.974696][ T2993] BPF: [ 1300.974696][ T2993] [ 1300.978110][ T3002] BPF:, 0 (anon) [ 1300.989385][ T3002] BPF:, 3 (invalid-name-offset) [ 1301.003971][ T3002] BPF:) [ 1301.009179][ T3015] BPF:[1] FUNC_PROTO (anon) [ 1301.014176][ T3002] BPF: [ 1301.024056][ T3002] BPF:Invalid return type [ 1301.031468][ T3015] BPF:return=1792 args=( [ 1301.042027][ T3002] BPF: [ 1301.042027][ T3002] [ 1301.056223][ T3015] BPF:0 (anon) 06:51:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x12, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}], 0xd) 06:51:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001600)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001640)={@mcast1, 0x0, r1}) 06:51:38 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x7fff, 0x5, &(0x7f0000001bc0)=[{&(0x7f00000009c0)="bc87dc6f390e6c150abfd1739a9b633c95d1767133b11625adb29d502b968cc1c26b0d192855ad12407fc5ead4202133", 0x30}, {&(0x7f0000000a00)}, {&(0x7f0000000a80)="e62fad53d2c8e912ac", 0x9, 0xffff}, {&(0x7f0000000ac0)="7ed2cbb9606f761b5602ca264013ce4592f9ad4e2365ce82e174fc6eaf8e4ced", 0x20, 0xffffffffffffff7f}, {&(0x7f0000000bc0)="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", 0xe6e, 0x8}]) [ 1301.071998][ T3015] BPF:, vararg [ 1301.077703][ T3015] BPF:) [ 1301.080582][ T3015] BPF: [ 1301.083504][ T3015] BPF:Invalid return type [ 1301.090004][ T3015] BPF: [ 1301.090004][ T3015] 06:51:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x900, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:38 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @mcast2}], 0x1c) [ 1301.147244][ T3026] BPF:[1] FUNC_PROTO (anon) [ 1301.160368][ T3026] BPF:return=18 args=( 06:51:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet6(r0, &(0x7f0000000440)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}}], 0x1, 0x0) 06:51:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={0x0}}, 0x0) [ 1301.190412][ T3026] BPF:0 (anon) [ 1301.205931][ T3026] BPF:, 0 (anon) [ 1301.210575][ T3026] BPF:, 3 (invalid-name-offset) [ 1301.222725][ T3035] BPF:[1] FUNC_PROTO (anon) [ 1301.232058][ T3026] BPF:) 06:51:39 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001600)={'team0\x00'}) 06:51:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000002680)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @private2={0xfc, 0x2, [], 0x1}}, 0x1c, &(0x7f0000000600)=[{&(0x7f0000000080)="da", 0x1}, {0x0}], 0x2, &(0x7f0000000780)=[@flowinfo={{0x14}}, @rthdrdstopts={{0x18}}], 0x30}}, {{&(0x7f0000000680)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0}}], 0x2, 0x50) [ 1301.246841][ T3035] BPF:return=2304 args=( [ 1301.252186][ T3026] BPF: [ 1301.256512][ T3034] loop3: detected capacity change from 0 to 16383 [ 1301.270333][ T3035] BPF:0 (anon) [ 1301.274164][ T3035] BPF:, vararg [ 1301.277930][ T3035] BPF:) [ 1301.281206][ T3035] BPF: [ 1301.284226][ T3035] BPF:Invalid return type [ 1301.289651][ T3035] BPF: [ 1301.289651][ T3035] 06:51:39 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000480)) [ 1301.295080][ T3026] BPF:Invalid return type [ 1301.301037][ T3026] BPF: [ 1301.301037][ T3026] [ 1301.310081][ T3045] BPF:[1] FUNC_PROTO (anon) [ 1301.323807][ T3048] BPF:[1] FUNC_PROTO (anon) [ 1301.324521][ T3045] BPF:return=2304 args=( [ 1301.342234][ T3045] BPF:0 (anon) 06:51:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xa00, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1301.359499][ T3048] BPF:return=18 args=( [ 1301.360912][ T3045] BPF:, vararg [ 1301.367368][ T3045] BPF:) [ 1301.370414][ T3045] BPF: [ 1301.373369][ T3045] BPF:Invalid return type [ 1301.378236][ T3045] BPF: [ 1301.378236][ T3045] [ 1301.386851][ T3048] BPF:0 (anon) [ 1301.401129][ T3048] BPF:, 0 (anon) [ 1301.405116][ T3048] BPF:, 3 (invalid-name-offset) 06:51:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x25, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:39 executing program 0: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) 06:51:39 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0)={0x0}) [ 1301.410513][ T3048] BPF:) [ 1301.413675][ T3048] BPF: [ 1301.420007][ T3048] BPF:Invalid return type [ 1301.427577][ T3048] BPF: [ 1301.427577][ T3048] 06:51:39 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001bc0)=[{&(0x7f00000009c0)="bc", 0x1}]) [ 1301.457510][ T3063] BPF:[1] FUNC_PROTO (anon) [ 1301.462477][ T3063] BPF:return=2560 args=( [ 1301.467089][ T3063] BPF:0 (anon) [ 1301.471694][ T3063] BPF:, vararg [ 1301.479786][ T3063] BPF:) [ 1301.486417][ T3063] BPF: [ 1301.489558][ T3063] BPF:Invalid return type [ 1301.494076][ T3063] BPF: [ 1301.494076][ T3063] 06:51:39 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) accept$inet6(r0, 0x0, 0x0) [ 1301.510678][ T3070] BPF:[1] FUNC_PROTO (anon) [ 1301.515300][ T3070] BPF:return=2560 args=( [ 1301.519851][ T3070] BPF:0 (anon) [ 1301.523287][ T3070] BPF:, vararg [ 1301.527374][ T3070] BPF:) [ 1301.530284][ T3070] BPF: [ 1301.533046][ T3070] BPF:Invalid return type [ 1301.538288][ T3070] BPF: [ 1301.538288][ T3070] [ 1301.544432][ T3072] BPF:[1] FUNC_PROTO (anon) 06:51:39 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$read(0xb, r0, &(0x7f0000000280)=""/16, 0x10) 06:51:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xb00, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1301.558060][ T3072] BPF:return=37 args=( [ 1301.572778][ T3072] BPF:0 (anon) [ 1301.583024][ T3072] BPF:, 0 (anon) [ 1301.590487][ T3072] BPF:, 3 (invalid-name-offset) [ 1301.595443][ T3072] BPF:) [ 1301.603028][ T3072] BPF: 06:51:39 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000001bc0)=[{0x0}, {&(0x7f0000000bc0)="cd994c3c35ffbfe974cf05c9eaef1d1bf489ec2d9e588688f44bf3d915309b0da7c1e4546c12850a27482c2f06c879e8c57c57dab5ec874dc3ad3d7c8cba4343a026677cd555e24c89a7de55886a0157592af7c0cc41f7532af9bb2b1c20dc59ec74e7316029c18feada4044977abbb3d62c7de1b4549d140d8af43287f784f330eccd78b2a1e1f9dc581929c9aef78470369eab45572dc94f16e9fa0e3b47a337a8c1b11fbe9f7f28a9c4dcac152db677b898982ee3a2078b8564e6e78f02a557b3f425d8ef3fcf52797dbd3aa640572aa5275f0e3221b4828d866a1df2d268f81167905a33bba4341f775dd2643930b6decb705a564a7bb36cf382f20f61d84cd1b6b5daec4dedbca4e1adc2d1d7a65c3e41dd2470e6ba11bcac7aa10c9aa2ea193300eeb9bb12ade7813dc4d637201f1bc9987c8742c29af0371e8de67fb45a88a12bf1b00d6e7c7101104475ccefb1ebfd699472da9dffc5354c06f8aeaa1c7e434d0c1013cb4ef3ebb3952cfd4b3d6b46b3eac19938ab40dc0b6ad78e8af868252b2fd8ba6b97eefef1a03686d0e1e0c44a70b65e7ac342a0f527a857600f0fb3a276f3644e8a1a48b35fd784929ae62d5a8ffc20111390d10b9029f078129e2c2542064d28d70cedf29186c8f970c154b2298ea3c4a3de1dca2e6e58f93feb114a97b6d9c6a3a1bc7856973c46d0484a74872e9c26", 0x1f8, 0x8}]) 06:51:39 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in={0x2, 0x3, @loopback}}}, 0x90) [ 1301.607589][ T3072] BPF:Invalid return type [ 1301.621699][ T3072] BPF: [ 1301.621699][ T3072] [ 1301.643566][ T3082] BPF:[1] FUNC_PROTO (anon) 06:51:39 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f00000002c0)) [ 1301.659298][ T3082] BPF:return=37 args=( [ 1301.668788][ T3084] BPF:[1] FUNC_PROTO (anon) [ 1301.685797][ T3082] BPF:0 (anon) [ 1301.692765][ T3084] BPF:return=2816 args=( [ 1301.707734][ T3082] BPF:, 0 (anon) 06:51:39 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB='8\x00\x00\x00$\x00\vp:}\x00'/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000d00010066715f636f64656c00000000040002"], 0x38}}, 0x0) [ 1301.709870][ T3084] BPF:0 (anon) [ 1301.715364][ T3084] BPF:, vararg [ 1301.720067][ T3084] BPF:) [ 1301.723248][ T3084] BPF: [ 1301.724343][ T3082] BPF:, 3 (invalid-name-offset) [ 1301.732548][ T3084] BPF:Invalid return type [ 1301.749944][ T3082] BPF:) [ 1301.749980][ T3084] BPF: [ 1301.749980][ T3084] [ 1301.752786][ T3082] BPF: 06:51:39 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_buf(r0, 0x29, 0xcc, 0x0, 0x0) 06:51:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x26, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x5, 0x0, &(0x7f00000000c0)=0xaa81ec856bfe0753) [ 1301.752858][ T3082] BPF:Invalid return type [ 1301.766958][ T3082] BPF: [ 1301.766958][ T3082] [ 1301.802751][ T3110] BPF:[1] FUNC_PROTO (anon) 06:51:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="410078bdf8ff000000000a00000006"], 0x20}}, 0x0) [ 1301.829353][ T3110] BPF:return=2816 args=( 06:51:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000080)) 06:51:39 executing program 0: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x688543) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100)='ethtool\x00', 0xffffffffffffffff) syz_read_part_table(0x6, 0x5, &(0x7f0000000500)=[{0x0, 0x0, 0x1}, {&(0x7f0000000140)="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", 0xfc, 0xbc28}, {0x0, 0x0, 0x38df}, {&(0x7f0000000280)="12", 0x1, 0x276d}, {0x0, 0x0, 0x2}]) [ 1301.851581][ T3114] BPF:[1] FUNC_PROTO (anon) [ 1301.864860][ T3110] BPF:0 (anon) [ 1301.865911][ T3114] BPF:return=38 args=( [ 1301.877395][ T3114] BPF:0 (anon) [ 1301.890347][ T3110] BPF:, vararg [ 1301.892127][ T3114] BPF:, 0 (anon) [ 1301.904299][ T3110] BPF:) [ 1301.906696][T16747] Bluetooth: hci0: command 0x0401 tx timeout [ 1301.913321][ T3110] BPF: [ 1301.920888][ T3110] BPF:Invalid return type [ 1301.921897][ T3121] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1301.928126][ T3110] BPF: [ 1301.928126][ T3110] [ 1301.940147][ T3114] BPF:, 3 (invalid-name-offset) 06:51:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000091bbe3"], 0x14}}, 0x0) [ 1301.959880][ T3114] BPF:) [ 1301.968150][ T3114] BPF: [ 1301.975124][ T3114] BPF:Invalid return type [ 1301.989247][ T3114] BPF: [ 1301.989247][ T3114] [ 1301.990443][ T3127] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 06:51:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xc00, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000040)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}}}}, 0x90) 06:51:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="3f0000000000ddffffff0f"], 0x14}}, 0x0) 06:51:39 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000000)=0x39) [ 1302.007809][ T3130] BPF:[1] FUNC_PROTO (anon) [ 1302.018178][ T3130] BPF:return=38 args=( 06:51:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, 0x0, 0xfffffeb2) [ 1302.067117][ T3130] BPF:0 (anon) [ 1302.070538][ T3130] BPF:, 0 (anon) [ 1302.074112][ T3130] BPF:, 3 (invalid-name-offset) [ 1302.075764][ T3137] BPF:[1] FUNC_PROTO (anon) [ 1302.097505][ T3137] BPF:return=3072 args=( [ 1302.109644][ T3137] BPF:0 (anon) 06:51:39 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x2, @pix={0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x2}}) [ 1302.119479][ T3137] BPF:, vararg [ 1302.121651][ T3130] BPF:) [ 1302.129598][ T3137] BPF:) [ 1302.133916][ T3130] BPF: [ 1302.138440][ T3137] BPF: [ 1302.150058][ T3137] BPF:Invalid return type [ 1302.156148][ T3137] BPF: [ 1302.156148][ T3137] [ 1302.176903][ T3130] BPF:Invalid return type [ 1302.182515][ T3130] BPF: [ 1302.182515][ T3130] [ 1302.186082][ T3147] BPF:[1] FUNC_PROTO (anon) [ 1302.204954][ T3147] BPF:return=3072 args=( [ 1302.213269][ T3147] BPF:0 (anon) [ 1302.223871][ T3147] BPF:, vararg 06:51:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x43, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, 0x0, 0x0) 06:51:40 executing program 1: syz_read_part_table(0x0, 0x3, &(0x7f0000001bc0)=[{0x0, 0x0, 0x4}, {0x0}, {&(0x7f0000000bc0)="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", 0x587}]) 06:51:40 executing program 3: add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$nl_generic(0x10, 0x3, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dlm_plock\x00', 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/dlm_plock\x00', 0x121000, 0x0) 06:51:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x425}, 0x14}}, 0x0) [ 1302.227772][ T3147] BPF:) [ 1302.230586][ T3147] BPF: [ 1302.233680][ T3147] BPF:Invalid return type [ 1302.260672][ T3147] BPF: [ 1302.260672][ T3147] 06:51:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xd00, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="410078bdddff00f9ffff09"], 0x20}}, 0x0) 06:51:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f0000000300), r1, 0x2}}, 0x18) [ 1302.319346][ T3159] BPF:[1] FUNC_PROTO (anon) [ 1302.329468][ T3159] BPF:return=67 args=( [ 1302.342804][ T3159] BPF:0 (anon) [ 1302.352307][ T3159] BPF:, 0 (anon) 06:51:40 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f00000000c0)={0x1, 0x800, 0x6, 0x84000}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@empty, @mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2, 0x9, 0x7, 0x500, 0x0, 0x1b30034, r1}) 06:51:40 executing program 0: write$sequencer(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="93"], 0x24) mlockall(0x7) [ 1302.373387][ T3159] BPF:, 3 (invalid-name-offset) [ 1302.391551][ T3159] BPF:) [ 1302.394864][ T3163] BPF:[1] FUNC_PROTO (anon) [ 1302.400938][ T3159] BPF: [ 1302.404113][ T3163] BPF:return=3328 args=( [ 1302.409258][ T3159] BPF:Invalid return type [ 1302.413994][ T3163] BPF:0 (anon) [ 1302.419484][ T3159] BPF: [ 1302.419484][ T3159] [ 1302.429416][ T3163] BPF:, vararg [ 1302.449054][ T3167] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1302.475304][ T3163] BPF:) [ 1302.482294][ T3175] BPF:[1] FUNC_PROTO (anon) [ 1302.483759][ T3163] BPF: [ 1302.503000][ T3163] BPF:Invalid return type [ 1302.511863][ T3175] BPF:return=67 args=( [ 1302.513685][ T3163] BPF: [ 1302.513685][ T3163] 06:51:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x1c}}, 0x0) [ 1302.517241][ T3177] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1302.541536][ T3178] BPF:[1] FUNC_PROTO (anon) [ 1302.545387][ T3175] BPF:0 (anon) [ 1302.562007][ T3175] BPF:, 0 (anon) 06:51:40 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@dev={0xfe, 0x80, [], 0xe}, @ipv4={[], [], @empty}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x0, 0x500, 0x0, 0x220}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000580)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000005c0)={@remote, 0x59, r1}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/full\x00', 0x309403, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r2, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/full\x00', 0x309403, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x3, 0x9, 0x0, 0x40, r2, 0x4, [], 0x0, r3, 0x0, 0x3, 0x3}, 0x40) [ 1302.572907][ T3178] BPF:return=3328 args=( [ 1302.581271][ T3175] BPF:, 3 (invalid-name-offset) [ 1302.590769][ T3178] BPF:0 (anon) [ 1302.604040][ T3175] BPF:) [ 1302.604621][ T3178] BPF:, vararg [ 1302.615487][ T3175] BPF: [ 1302.618822][ T3178] BPF:) [ 1302.627635][ T3178] BPF: [ 1302.629772][ T3175] BPF:Invalid return type [ 1302.639930][ T3178] BPF:Invalid return type [ 1302.652131][ T3175] BPF: [ 1302.652131][ T3175] [ 1302.660206][ T3178] BPF: [ 1302.660206][ T3178] 06:51:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x48, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:40 executing program 5: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000001540), 0x4) 06:51:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000034c0)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @private1}, 0xff8f, 0x0}}], 0x1, 0x0) 06:51:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x28800800}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 06:51:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xe00, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:40 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) 06:51:40 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x80) sendmmsg$inet6(r0, &(0x7f0000003280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x48015) 06:51:40 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_DISASSOCIATE_REQ(r0, 0x0, 0x0) [ 1302.847808][ T3195] BPF:[1] FUNC_PROTO (anon) [ 1302.855288][ T3197] BPF:[1] FUNC_PROTO (anon) [ 1302.863048][ T3195] BPF:return=72 args=( [ 1302.878433][ T3195] BPF:0 (anon) [ 1302.883610][ T3197] BPF:return=3584 args=( [ 1302.890880][ T3195] BPF:, 0 (anon) [ 1302.901207][ T3197] BPF:0 (anon) [ 1302.901777][ T3195] BPF:, 3 (invalid-name-offset) [ 1302.913874][ T3197] BPF:, vararg [ 1302.929671][ T3197] BPF:) [ 1302.935250][ T3195] BPF:) [ 1302.946682][ T3195] BPF: 06:51:40 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000300)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0xee9, 0x0, 0x0, 0x0, 0x0, 0x0, "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"}}, 0x1001) [ 1302.947700][ T3197] BPF: [ 1302.959665][ T3197] BPF:Invalid return type [ 1302.962706][ T3195] BPF:Invalid return type [ 1302.976446][ T3197] BPF: [ 1302.976446][ T3197] [ 1302.985481][ T3195] BPF: [ 1302.985481][ T3195] [ 1303.019975][ T3206] BPF:[1] FUNC_PROTO (anon) [ 1303.032534][ T3206] BPF:return=3584 args=( [ 1303.043991][ T3206] BPF:0 (anon) [ 1303.060094][ T3206] BPF:, vararg [ 1303.071002][ T3195] BPF:[1] FUNC_PROTO (anon) [ 1303.075625][ T3195] BPF:return=72 args=( [ 1303.090837][ T3195] BPF:0 (anon) [ 1303.096499][ T3206] BPF:) [ 1303.099870][ T3195] BPF:, 0 (anon) [ 1303.103593][ T3206] BPF: [ 1303.106483][ T3195] BPF:, 3 (invalid-name-offset) [ 1303.113179][ T3206] BPF:Invalid return type [ 1303.119337][ T3195] BPF:) [ 1303.122283][ T3206] BPF: [ 1303.122283][ T3206] [ 1303.129417][ T3195] BPF: [ 1303.133399][ T3195] BPF:Invalid return type [ 1303.144026][ T3195] BPF: [ 1303.144026][ T3195] 06:51:41 executing program 0: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmat(r0, &(0x7f0000ffc000/0x3000)=nil, 0x6000) 06:51:41 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000cc0)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_OURS={0x4c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x2d, 0x4, "3ca5ff819a7c3a27dba9b5043003334272f5a031ef728e3f4c17e7bead69f4dba8c10531dd8d5da475"}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_OURS={0xe54, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xe4d, 0x5, "e75d38e60fef2db6d6af98544600368f06335fc21c799f5a4842c41d016984cfb4ba212e8077a5e234b7140172fa02a40d332d4cc8af96f9a78c5c2da4c687afffb18a9effed215843f7657daa22e34122d641bb9147f7d6954a9022dda4d29d8c530b4f39f0e5316583a5f405fe8d5dff38597655ba4ceaeb7fb89ecf7fcb4fba4225731e14c3b6079c35a74d635d96520bc03432c262c190944ca78b63f1dc039f746a84ceb072106a2b692d429663744dcd0fbbe84d39232ff0c075058871c5adc871a400206623541085d8d6b905e5f5ba4397745f861816892b042a5a6454727dbd17ba710c9399dacb80ce15f5be33dd83f928a48fa76d7c5534fc987d4c459b42c7303e6cd5ea78724888c377f6a6ab3b63a2b7f1d77efa3ba97b2ad34d0e9759c5f2a391f43b4ef40ce407d7fa91e415fd342bf097d4d8d20f62299ab70539c3019e10a7858f4571c4a3e57815d630eebb5e057130deec80f1253022a6b8cbf30a19bcd066b264459a0f5d8309efb51cc8bf17797f45da933356cefb183353f81e8e286692551a65962d47e038542314167c7859b41e2f937ec31955c9893a63ffb68d826b869c61e87b6da8d7ec52ea70266e84a5d169992c806c2b9315b8d5282a8eb4c17c10f70beb1eae612827dcc3f9760e8d90e1cfad0d6fe008a4e7eab2c27f1d3837df7a6e014f5548e6ca86c9ba29f24d05570dc51ec3fb04375d521e391476f6d793746b61a3714a2af3c08b6c6fd796118f78f3e305fe9fd250613f94a5ea344a739b6c99edb9139a257e18725b986d9dfd5425ea72657b6f1a240eb31ce47e82475ac312dec52bcf00c58b6d479134f6e00b189c6eccd64dbc3fdee915db20c933338128b43656067be86daa7304122ad065af1fdf123e2a1d35946da24b3094464d8e36fadb2e467f1ba7b588cff3ee82be2c1edd4791c2f3230237d5bc51199bd9b661053c2c0a44cbaaf78d22cdfca97905ba19fafce33c8cda5657d3084ac56f97bade6b63ed8b0e9075157933791adf77d73ad9f0869b46f186b07eabc2382f320aa3c2ebc8d919ac148410b284df6add60dd52f5bd514f547a2c3a5c796f854f5b813748d146193a6c7338a6e7970879f4d2691e139b97c0abd2922ba697684eade8eaf35915e7d59f1abe00bd7578c5c6fd422c90573d38897fee3148687e233ae0309959f3144db243c352fad77b575b8f2a0bc611c8f5cad91d7bad682893dc146573818820e295daec5a1b04ddaeacfb0245ed5f41da103b6840611edc4ab7f6d9a322401a69c05e391f096656afb7d0b1e1680a81bab85d0e5f396047621196f21dc2b1af8107a9069b3d9a8dffe784acf5f8fe4fe466c8f3d531414388623e22e9b2ff044bf1cfd718e2def9c565b5f79fb7e6aa9db8dba7cf4ddfb10dbfb7722e149bb1c369df659cda56b7f24c606c4b252cd9d03a97ef964ee5c7e64b08b43f47a7c275c3fed20bc6129b06bb86154c01a66f43c92134b4b6dfa3f498a2349145ef5f9136ba60230d764475be8ef08eda43c7aa55bc52f5e038e379141c4529f71720f8627cccf489552d9ce635e467f6ab124e62293a9be56e43ddfbccda55fe879c3465a26f2e0b255c0b98dab337c3e2c8b488800e36cdb671769c650f9c6b6c77b436a9a8053eb544c7bd1d7149be464fce86a4ddbb676329698e7dfb81e22d96ee024991043f4478e3d1de6d40da018f9896e2cacfce701bb6b31edab270e16bf9586bdb1ea597f16267747c4d07e79472ee3d006b5f306c2fc041e33e1ed38d602587cf96520c0bcfea06493521379de99825317f38b40c19f8898c7690f1d6d05d5d64eb3fc8ea82004505977bd38118cd97061dd135a955e427ea02d80f36e4594355aece96577a2f7293bb2c8ce0e641b565225b3ca94e188179b867f4f0dc2e656ed7d54b1644566711027b466b9b249dd946630fa4891d1e7eb5ae0fe67fc19acf2132eee837b064eaedf095474807f8ce16c6737409f482ce0c4cabb867cf4681ccac457b3873df92a0f4a9a5013325daf06ebcd87ea7edb6cb3dd39402124af6d793e3bb85f8b889c292aa2360c71fc53f6c68d754f83652eec9fae42573833ce5d4ab1fc7b2b663c812b2bc7c35c0ac3c3c82e2a85941189f8e225154d1275c09d2b6df24ff71234b489f8d45bd33e708f6996f1d66dc230be7d0b8a5929ec06e1ac6b3f49da47e8575e0d63d995132962d83504dc1232fb797801f73e8a5b0e9fccafb0f0adbc6a1e883acefbf0113a38d80a41632a1a0a756de4f49c6a7513f78132ff6af84cd9fe540c52b731efbbdbc9c32614d0ba659aa3dbc2f9af7a99f58ff15600f326b805c1d53afa0f64e8600d6e281dae4f530dd50267e03671cdb8d0be83397e411a85014550d23223c610590bf9054b90889b715a1087e001a64469c58bfb48b55ac764f21f62c4ce5dc46d7c0b652d30d87492fde8903374ed065c874702eab6d16d191ae6ca682ba0a9c4522bc2dc153ce348966f225ddc6eaf281499fc5cb8bd7e5ddf0d8f9aee3c46dfb1f6da2fbf20579de8e908e4f38264c6e7d40fbd31cfd0d76694f885c6d8fdf357c66127857ef66e0da2ea9746fd72e1ee6b8c23d70369f2bf20eb0e810101969fabb51ee1ae47476e3d2768e9765b0984f8f1c7bd7c1def4c7e86ff7278af3852c277f3cfb5d90bb112388d80a3b85a71f32a752a3222d2c5689c6a0157bd50255fa87f935438f9301acf3f5a41d1d575112f36da022bdbd36683368897818375901b4119d789d41f0847392f911ac1bd416f766bc83d023b0c6a557467e73eb2576dd324103bb5dcee390fc6d18cb2f0f711a3dc1fe1d9178e581d14e1544dad268f2fcb8b9c18af87eb3274e6650187d959bc0624778da8b9a1800ce34a6cafff18c7b96c8aa7ae00323ef8576a7288118262bbd85af9c3f55af538ea48f24c275764ec2e5f7f19cdcd2c442423bfffd2e1d764069a1225d0fef55b0ac5910c73ffadbdcff58f080c3350df2e2c6f98df92d7439628402bba0055e978dff1fb5b66b4087be929799598630664150a779c9ccfec1703e67f9aa74ba6e37bed6f5e055d6093ba24d9f3e2e768a1146d1115fd64d9b1ec63c82c1ae0699319dc26e83b49315f6000d07fc0f85a8028b472d098581b082b8626c64a26f50b6addf7d21219ebf67c18c524abd4ff79f7d894b35a948b29d210f0d6fd9df836eefaeb0e9560f6e9e4f430f7c4c9eacdc202d0d6a4d04a508ce17971ca0ef8953f60fa8d24fa449195c19e2099a326415d1ff8ab47ce1270d17cc700c4f08cccc4e68ded4eb34b307b58e26428dfe24f46d0494f020e3649477a65e425e8ccfde875dbc2bf0704575f3081582edb53fa22da3af8c0a86b2c2dd49c9797219d15fdee56730f4207ab24013924aef3d84e3fb7c60b18a883d9435fbe721b6f4bf4576cd0e8b4223ed27511895a31ee3929c56a48fb81dc60da967955b50273f86a47a408d634df0321094a90ef950456b49caed518aff8b55f4ebc7f577f3370f9c87b76fac4581df413eca85f43cacaad55ecd112473c5c0ed93171618ebd2cacda1d283d32fdf8c423023bc00657efca0c640c0a357f6312b5c85ac42e5d616c4137a2ec27bea7c434abe9b0aaf9a00366eca25a0380c281a3c0ddf8861e1b0d800f67668e6bee5e36ae6b00109bd2197fb5dd9f911ac33d0992e74a713dc1368ce3f6c87edd89d251e6f25116aadf220f705f358eb52b7bd4f7ea22d82bceae66d2d943c08a04e5d3cbd4dec68f790788860fd8d5cb2a62a4f7f69429e7ee21408bdf2d7ff4c6e3586d1d8b9e6f836fa4574fb2b01838c8f4aae2885f8cf90ecac1ee48993fac56699e759915d19224c9d083abad78752b712504a1457e8d26a6880a3bdcb864ae78c85217ba75a78604301813caa06f11da83874faafaae469ac53ad67fb7d00623a3255458f76e3109eb3325921cafe537fb3e56a07feb09a6234c474366ced32386382bcc88dd8a10c4083b4442c6d35a6b6233e7aff50ae15ecec473ef873e9a78f589dd758802e614c2b1fb0995b06f277558ae08c2c1045ab472f087f4a8214a8aac146c0b83396dcaaba8b93e16c3db68cc500f300e92f9fd743fc356b14d631883d5fe7d1bbe6f7e1111e30ad662aadca9df535c4dee06734e8c20fba5bb975c2f640c2724f189dae13bb64e0e6dce4143746b6d7be58019feb9b46f87f975f30153b3871bd8f5caaee1045bda3af6260cbaa2f79003204382eda523a93cba59b3952dccccee7c9312e46091a7fe373a7d770669fef2d528dc35f982e43363edb93dd41473b0e3b0bcb2e092667f896837c85161a5e502b16804954da93fd8dac35af72477a87b3bfc3ff8b61d8f92eda76f3d82a60597cedc835236eabff2bab5feb24d5ae7b27115f0cfee50600bea84470a1262201e4205aff3ddc8c29ae78ba08dc2df251054e9e263aaba708c0eb8f975c85cbadc49e25a408d72c2ad9c03b60012a6fb4553f104f254fa821b5baea1e10bfd1b25c5fc8cf0413184ddaaed45a16ccbf3bba604595f5e0538a2d1dd5d3542b408f85259cec5889ff5502f57fe439d6cec34b598a3e520347fe398cb3d2251fdfea2499b38f5fa3fa61fd4fc9c33aa801612f9294e1807d8a1334e739b734f0d48cd9a0317ab43fa151bc2c8dd0a761e563297d8e46ec2779f15ec4d4626e2df459f2c59ec5f46fc04e5127e095a763b7668ae5ee079c0cede347a2041e82ddb0fa2b708a4a4a73ed5d1aa981d06b386e61dab898cf274117e374255a0ad08d8102288e0cdd0d612039560337ba54b2c4d5333d4125fd905b400e197fb9b8778f271579850b136ce40b8a7db31d70fe920c3078e252113d7de24e173a3bb0af405ba09d7d08c20ef7377a5391439f3e201ede7c10612b0a0690a2648e608727116b82ea69c5e077f4fc34ee63968b87c11c393fb130cdc4c7b5e2c7f673e522066e9b8f56c0a967da798776ec9aa3e105d6cc35b8e33dc6cda72b9a44fe87188968951854a49cdc36ffd52b28fc2a8409723bed5b955b9b1c8566f37244a865b9e6031518d53f6cbfd82274ff0cd42bbd5004e0d5e483971f23af1cd1100fa895bc9eb9c040422fd7927f81f4e0ea51c5792c59b79365c9576004f21ae8705a66"}]}]}, 0xec4}}, 0x0) 06:51:41 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x81, 0x0) write$tun(r0, &(0x7f00000003c0)={@void, @val, @eth={@random="43629491d6c5", @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "1d2865", 0x1c4, 0x6, 0x0, @remote, @private0, {[@dstopts={0x0, 0x1b, [], [@generic={0x0, 0xd7, "949b7efe4f365e6cd246e7fc8d8df1309749ddebf689a1f5da7d4005f8ca6397e37f83e52e7d9fc065c21d3e4119d771a485a73638f6af1f641a90556cc8723617d9296461c2c5394d52c04a8612ec50d1959bbdaa908e9a7f9f914231da415afd141726c5ebfe8f3db420b31da70d736dc77ea6d60f070cea1064bb4b694c17e857507ba67ac1176370c172142fe4ef11ca5b01513fd08a276d51207986e905312f45e92a5495246555fcbccefd95eb681b58e2986ea84f721765b0aadbe8acbc93fd6efb9f58e6f0e524fc7f6a86fd2738cd3c49cb7e"}]}, @srh={0x0, 0xa, 0x4, 0x5, 0x0, 0x0, 0x0, [@private1, @ipv4={[], [], @dev}, @private1, @rand_addr=' \x01\x00', @ipv4={[], [], @broadcast}]}, @routing={0x0, 0x6, 0x0, 0x0, 0x0, [@private0, @private2, @loopback]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4}]}}, {"4021dde6ac05f5ed1cdec091033111ca289cf5fd37a4b7ce93dae5d47e64101434fb6a1bdecb316770a70a7120b12eabb0ca19db"}}}}}}}}, 0x208) 06:51:41 executing program 3: syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00', 0xffffffffffffffff) 06:51:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x1100, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x4c, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:41 executing program 5: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00', 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0xc) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)={0x14, r0, 0x1}, 0x14}}, 0x0) 06:51:41 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, &(0x7f0000000080)) 06:51:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000004c0)='batadv\x00', r0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="352728bd7000fedbdf250600000008"], 0x24}}, 0x0) [ 1303.722413][ T3226] BPF:[1] FUNC_PROTO (anon) [ 1303.722426][ T3226] BPF:return=4352 args=( [ 1303.722434][ T3226] BPF:0 (anon) [ 1303.722440][ T3226] BPF:, vararg [ 1303.722468][ T3226] BPF:) 06:51:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x1200, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x60, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1303.722473][ T3226] BPF: [ 1303.722478][ T3226] BPF:Invalid return type [ 1303.722483][ T3226] BPF: [ 1303.722483][ T3226] 06:51:41 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:51:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000d00)) [ 1303.746462][ T3230] BPF:[1] FUNC_PROTO (anon) [ 1303.746475][ T3230] BPF:return=4352 args=( [ 1303.746483][ T3230] BPF:0 (anon) 06:51:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000240)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) [ 1303.746488][ T3230] BPF:, vararg [ 1303.746494][ T3230] BPF:) [ 1303.746525][ T3230] BPF: [ 1303.746530][ T3230] BPF:Invalid return type [ 1303.750417][ T3230] BPF: [ 1303.750417][ T3230] [ 1303.769422][ T3231] BPF:[1] FUNC_PROTO (anon) [ 1303.769435][ T3231] BPF:return=76 args=( [ 1303.769443][ T3231] BPF:0 (anon) [ 1303.769450][ T3231] BPF:, 0 (anon) [ 1303.769459][ T3231] BPF:, 3 (invalid-name-offset) [ 1303.769466][ T3231] BPF:) [ 1303.769471][ T3231] BPF: [ 1303.769476][ T3231] BPF:Invalid return type [ 1303.769482][ T3231] BPF: [ 1303.769482][ T3231] [ 1303.793790][ T3233] BPF:[1] FUNC_PROTO (anon) [ 1303.793802][ T3233] BPF:return=76 args=( [ 1303.793808][ T3233] BPF:0 (anon) [ 1303.793814][ T3233] BPF:, 0 (anon) [ 1303.793822][ T3233] BPF:, 3 (invalid-name-offset) [ 1303.793827][ T3233] BPF:) [ 1303.793832][ T3233] BPF: [ 1303.793836][ T3233] BPF:Invalid return type [ 1303.793841][ T3233] BPF: [ 1303.793841][ T3233] [ 1303.905135][ T3248] BPF:[1] FUNC_PROTO (anon) [ 1303.905148][ T3248] BPF:return=4608 args=( [ 1303.905155][ T3248] BPF:0 (anon) [ 1303.905161][ T3248] BPF:, vararg [ 1303.905166][ T3248] BPF:) [ 1303.905170][ T3248] BPF: [ 1303.905210][ T3248] BPF:Invalid return type [ 1303.905215][ T3248] BPF: [ 1303.905215][ T3248] [ 1303.912670][ T3250] BPF:[1] FUNC_PROTO (anon) [ 1303.912682][ T3250] BPF:return=4608 args=( [ 1303.912690][ T3250] BPF:0 (anon) [ 1303.912697][ T3250] BPF:, vararg [ 1303.912703][ T3250] BPF:) [ 1303.912708][ T3250] BPF: [ 1303.912713][ T3250] BPF:Invalid return type [ 1303.912721][ T3250] BPF: [ 1303.912721][ T3250] [ 1303.967007][ T3252] BPF:[1] FUNC_PROTO (anon) [ 1303.967088][ T3252] BPF:return=96 args=( [ 1303.967096][ T3252] BPF:0 (anon) [ 1303.967103][ T3252] BPF:, 0 (anon) [ 1303.967110][ T3252] BPF:, 3 (invalid-name-offset) [ 1303.968711][ T3252] BPF:) [ 1303.968718][ T3252] BPF: [ 1303.968723][ T3252] BPF:Invalid return type [ 1303.968729][ T3252] BPF: [ 1303.968729][ T3252] [ 1303.977108][ T3256] BPF:[1] FUNC_PROTO (anon) [ 1303.977120][ T3256] BPF:return=96 args=( [ 1303.977129][ T3256] BPF:0 (anon) [ 1303.977136][ T3256] BPF:, 0 (anon) [ 1303.977146][ T3256] BPF:, 3 (invalid-name-offset) [ 1303.977153][ T3256] BPF:) [ 1303.977158][ T3256] BPF: 06:51:42 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x81, 0x0) write$tun(r0, &(0x7f00000003c0)={@void, @val, @eth={@random="43629491d6c5", @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "1d2865", 0x1c4, 0x6, 0x0, @remote, @private0, {[@dstopts={0x0, 0x1b, [], [@generic={0x0, 0xd7, "949b7efe4f365e6cd246e7fc8d8df1309749ddebf689a1f5da7d4005f8ca6397e37f83e52e7d9fc065c21d3e4119d771a485a73638f6af1f641a90556cc8723617d9296461c2c5394d52c04a8612ec50d1959bbdaa908e9a7f9f914231da415afd141726c5ebfe8f3db420b31da70d736dc77ea6d60f070cea1064bb4b694c17e857507ba67ac1176370c172142fe4ef11ca5b01513fd08a276d51207986e905312f45e92a5495246555fcbccefd95eb681b58e2986ea84f721765b0aadbe8acbc93fd6efb9f58e6f0e524fc7f6a86fd2738cd3c49cb7e"}]}, @srh={0x0, 0xa, 0x4, 0x5, 0x0, 0x0, 0x0, [@private1, @ipv4={[], [], @dev}, @private1, @rand_addr=' \x01\x00', @ipv4={[], [], @broadcast}]}, @routing={0x0, 0x6, 0x0, 0x0, 0x0, [@private0, @private2, @loopback]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4}]}}, {"4021dde6ac05f5ed1cdec091033111ca289cf5fd37a4b7ce93dae5d47e64101434fb6a1bdecb316770a70a7120b12eabb0ca19db"}}}}}}}}, 0x208) 06:51:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x1e00, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:42 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, 0x0, 0xd) 06:51:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x68, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:42 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x401c0, 0x0) 06:51:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000002680)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000600)=[{&(0x7f0000000080)="da", 0x1}], 0x1}}], 0x1, 0x50) [ 1303.977179][ T3256] BPF:Invalid return type [ 1303.977185][ T3256] BPF: [ 1303.977185][ T3256] [ 1303.986638][T16747] Bluetooth: hci0: command 0x0401 tx timeout 06:51:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 1304.262638][ T3268] BPF:[1] FUNC_PROTO (anon) [ 1304.279900][ T3268] BPF:return=7680 args=( [ 1304.286201][ T3272] BPF:[1] FUNC_PROTO (anon) [ 1304.301203][ T3268] BPF:0 (anon) 06:51:42 executing program 5: r0 = getpgrp(0x0) wait4(r0, 0x0, 0x0, &(0x7f0000000280)) 06:51:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x6c, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000404000000140001800800ccbd2b94dc3c050002"], 0x28}}, 0x0) 06:51:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x2000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:42 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) [ 1304.306258][ T3272] BPF:return=104 args=( [ 1304.306271][ T3272] BPF:0 (anon) [ 1304.306278][ T3272] BPF:, 0 (anon) [ 1304.306286][ T3272] BPF:, 3 (invalid-name-offset) [ 1304.306293][ T3272] BPF:) [ 1304.306298][ T3272] BPF: [ 1304.306303][ T3272] BPF:Invalid return type [ 1304.306310][ T3272] BPF: [ 1304.306310][ T3272] [ 1304.314451][ T3277] BPF:[1] FUNC_PROTO (anon) [ 1304.314464][ T3277] BPF:return=104 args=( [ 1304.314472][ T3277] BPF:0 (anon) [ 1304.314479][ T3277] BPF:, 0 (anon) [ 1304.314551][ T3277] BPF:, 3 (invalid-name-offset) [ 1304.314559][ T3277] BPF:) [ 1304.314564][ T3277] BPF: [ 1304.314570][ T3277] BPF:Invalid return type [ 1304.314576][ T3277] BPF: [ 1304.314576][ T3277] [ 1304.329175][ T3268] BPF:, vararg [ 1304.329186][ T3268] BPF:) [ 1304.329192][ T3268] BPF: [ 1304.329198][ T3268] BPF:Invalid return type [ 1304.329204][ T3268] BPF: [ 1304.329204][ T3268] [ 1304.340884][ T3279] BPF:[1] FUNC_PROTO (anon) [ 1304.340897][ T3279] BPF:return=7680 args=( [ 1304.340904][ T3279] BPF:0 (anon) [ 1304.340909][ T3279] BPF:, vararg [ 1304.340916][ T3279] BPF:) [ 1304.340982][ T3279] BPF: [ 1304.340988][ T3279] BPF:Invalid return type 06:51:42 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x81, 0x0) write$tun(r0, &(0x7f00000003c0)={@void, @val, @eth={@random="43629491d6c5", @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "1d2865", 0x1c4, 0x6, 0x0, @remote, @private0, {[@dstopts={0x0, 0x1b, [], [@generic={0x0, 0xd7, "949b7efe4f365e6cd246e7fc8d8df1309749ddebf689a1f5da7d4005f8ca6397e37f83e52e7d9fc065c21d3e4119d771a485a73638f6af1f641a90556cc8723617d9296461c2c5394d52c04a8612ec50d1959bbdaa908e9a7f9f914231da415afd141726c5ebfe8f3db420b31da70d736dc77ea6d60f070cea1064bb4b694c17e857507ba67ac1176370c172142fe4ef11ca5b01513fd08a276d51207986e905312f45e92a5495246555fcbccefd95eb681b58e2986ea84f721765b0aadbe8acbc93fd6efb9f58e6f0e524fc7f6a86fd2738cd3c49cb7e"}]}, @srh={0x0, 0xa, 0x4, 0x5, 0x0, 0x0, 0x0, [@private1, @ipv4={[], [], @dev}, @private1, @rand_addr=' \x01\x00', @ipv4={[], [], @broadcast}]}, @routing={0x0, 0x6, 0x0, 0x0, 0x0, [@private0, @private2, @loopback]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4}]}}, {"4021dde6ac05f5ed1cdec091033111ca289cf5fd37a4b7ce93dae5d47e64101434fb6a1bdecb316770a70a7120b12eabb0ca19db"}}}}}}}}, 0x208) 06:51:42 executing program 3: syz_open_dev$sg(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0xbc28}]) 06:51:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @remote, 0xff}], 0x1c) [ 1304.340995][ T3279] BPF: [ 1304.340995][ T3279] [ 1304.444380][ T3288] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 1304.455607][ T3289] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 1304.474389][ T3290] BPF:[1] FUNC_PROTO (anon) [ 1304.608660][ T3291] BPF:[1] FUNC_PROTO (anon) [ 1304.613797][ T3290] BPF:return=108 args=( 06:51:42 executing program 0: shmat(0x0, &(0x7f00007fd000/0x800000)=nil, 0x4000) [ 1304.620591][ T3290] BPF:0 (anon) [ 1304.628839][ T3290] BPF:, 0 (anon) [ 1304.635713][ T3290] BPF:, 3 (invalid-name-offset) [ 1304.642333][ T3291] BPF:return=8192 args=( [ 1304.644054][ T3290] BPF:) [ 1304.650762][ T3298] loop3: detected capacity change from 0 to 188 [ 1304.659145][ T3290] BPF: [ 1304.663160][ T3290] BPF:Invalid return type [ 1304.667622][ T3290] BPF: [ 1304.667622][ T3290] 06:51:42 executing program 3: syz_open_dev$sg(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0xbc28}]) [ 1304.670004][ T3291] BPF:0 (anon) [ 1304.687342][ T3291] BPF:, vararg [ 1304.699800][ T3303] BPF:[1] FUNC_PROTO (anon) [ 1304.708924][ T3291] BPF:) 06:51:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x74, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000480)=0xb76, 0x4) 06:51:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x2500, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:42 executing program 3: syz_open_dev$sg(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0xbc28}]) [ 1304.739286][ T3303] BPF:return=108 args=( [ 1304.739299][ T3303] BPF:0 (anon) [ 1304.739306][ T3303] BPF:, 0 (anon) [ 1304.739313][ T3303] BPF:, 3 (invalid-name-offset) [ 1304.739319][ T3303] BPF:) [ 1304.739422][ T3303] BPF: [ 1304.739428][ T3303] BPF:Invalid return type [ 1304.739435][ T3303] BPF: [ 1304.739435][ T3303] 06:51:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x7a, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:42 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x81, 0x0) write$tun(r0, &(0x7f00000003c0)={@void, @val, @eth={@random="43629491d6c5", @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "1d2865", 0x1c4, 0x6, 0x0, @remote, @private0, {[@dstopts={0x0, 0x1b, [], [@generic={0x0, 0xd7, "949b7efe4f365e6cd246e7fc8d8df1309749ddebf689a1f5da7d4005f8ca6397e37f83e52e7d9fc065c21d3e4119d771a485a73638f6af1f641a90556cc8723617d9296461c2c5394d52c04a8612ec50d1959bbdaa908e9a7f9f914231da415afd141726c5ebfe8f3db420b31da70d736dc77ea6d60f070cea1064bb4b694c17e857507ba67ac1176370c172142fe4ef11ca5b01513fd08a276d51207986e905312f45e92a5495246555fcbccefd95eb681b58e2986ea84f721765b0aadbe8acbc93fd6efb9f58e6f0e524fc7f6a86fd2738cd3c49cb7e"}]}, @srh={0x0, 0xa, 0x4, 0x5, 0x0, 0x0, 0x0, [@private1, @ipv4={[], [], @dev}, @private1, @rand_addr=' \x01\x00', @ipv4={[], [], @broadcast}]}, @routing={0x0, 0x6, 0x0, 0x0, 0x0, [@private0, @private2, @loopback]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4}]}}, {"4021dde6ac05f5ed1cdec091033111ca289cf5fd37a4b7ce93dae5d47e64101434fb6a1bdecb316770a70a7120b12eabb0ca19db"}}}}}}}}, 0x208) [ 1304.748921][ T3291] BPF: [ 1304.748932][ T3291] BPF:Invalid return type [ 1304.748939][ T3291] BPF: [ 1304.748939][ T3291] [ 1304.763149][ T3308] BPF:[1] FUNC_PROTO (anon) [ 1304.763162][ T3308] BPF:return=8192 args=( [ 1304.763171][ T3308] BPF:0 (anon) [ 1304.763177][ T3308] BPF:, vararg [ 1304.763183][ T3308] BPF:) [ 1304.763188][ T3308] BPF: [ 1304.763193][ T3308] BPF:Invalid return type [ 1304.763204][ T3308] BPF: [ 1304.763204][ T3308] [ 1304.789390][ T3310] loop3: detected capacity change from 0 to 188 [ 1304.840351][ T3316] BPF:[1] FUNC_PROTO (anon) [ 1304.840364][ T3316] BPF:return=116 args=( [ 1304.840372][ T3316] BPF:0 (anon) [ 1304.840378][ T3316] BPF:, 0 (anon) [ 1304.840397][ T3316] BPF:, 3 (invalid-name-offset) [ 1304.840404][ T3316] BPF:) [ 1304.840408][ T3316] BPF: [ 1304.840413][ T3316] BPF:Invalid return type [ 1304.840419][ T3316] BPF: [ 1304.840419][ T3316] [ 1304.874613][ T3317] BPF:[1] FUNC_PROTO (anon) [ 1304.874627][ T3317] BPF:return=116 args=( [ 1304.874635][ T3317] BPF:0 (anon) [ 1304.874653][ T3317] BPF:, 0 (anon) [ 1304.874662][ T3317] BPF:, 3 (invalid-name-offset) [ 1304.874670][ T3317] BPF:) [ 1304.874675][ T3317] BPF: [ 1304.874681][ T3317] BPF:Invalid return type [ 1304.874687][ T3317] BPF: [ 1304.874687][ T3317] [ 1304.944202][ T3322] BPF:[1] FUNC_PROTO (anon) [ 1305.014790][ T3328] BPF:[1] FUNC_PROTO (anon) [ 1305.091325][ T3326] loop3: detected capacity change from 0 to 188 [ 1305.098965][ T3328] BPF:return=122 args=( [ 1305.103137][ T3328] BPF:0 (anon) [ 1305.108518][ T3328] BPF:, 0 (anon) [ 1305.112087][ T3328] BPF:, 3 (invalid-name-offset) [ 1305.112096][ T3328] BPF:) [ 1305.112102][ T3328] BPF: [ 1305.112108][ T3328] BPF:Invalid return type [ 1305.112123][ T3328] BPF: [ 1305.112123][ T3328] [ 1305.112190][ T3322] BPF:return=9472 args=( [ 1305.112270][ T3322] BPF:0 (anon) [ 1305.112276][ T3322] BPF:, vararg [ 1305.112282][ T3322] BPF:) [ 1305.112288][ T3322] BPF: [ 1305.112294][ T3322] BPF:Invalid return type [ 1305.112300][ T3322] BPF: [ 1305.112300][ T3322] 06:51:43 executing program 3: syz_open_dev$sg(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0xbc28}]) 06:51:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x4300, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xa0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1305.122967][ T3334] BPF:[1] FUNC_PROTO (anon) [ 1305.122981][ T3334] BPF:return=122 args=( [ 1305.122989][ T3334] BPF:0 (anon) [ 1305.122997][ T3334] BPF:, 0 (anon) [ 1305.123006][ T3334] BPF:, 3 (invalid-name-offset) [ 1305.123012][ T3334] BPF:) [ 1305.123018][ T3334] BPF: [ 1305.123024][ T3334] BPF:Invalid return type [ 1305.123037][ T3334] BPF: [ 1305.123037][ T3334] [ 1305.131831][ T3335] BPF:[1] FUNC_PROTO (anon) [ 1305.131905][ T3335] BPF:return=9472 args=( [ 1305.131912][ T3335] BPF:0 (anon) [ 1305.131917][ T3335] BPF:, vararg [ 1305.131923][ T3335] BPF:) [ 1305.131928][ T3335] BPF: [ 1305.131932][ T3335] BPF:Invalid return type [ 1305.131939][ T3335] BPF: [ 1305.131939][ T3335] [ 1305.342714][ T3345] loop3: detected capacity change from 0 to 188 [ 1305.353130][ T3348] BPF:[1] FUNC_PROTO (anon) [ 1305.363694][ T3350] BPF:[1] FUNC_PROTO (anon) [ 1305.375718][ T3348] BPF:return=17152 args=( [ 1305.385505][ T3350] BPF:return=160 args=( [ 1305.410484][ T3350] BPF:0 (anon) [ 1305.410850][ T3348] BPF:0 (anon) [ 1305.414023][ T3350] BPF:, 0 (anon) [ 1305.421030][ T3350] BPF:, 3 (invalid-name-offset) [ 1305.425909][ T3350] BPF:) [ 1305.428731][ T3350] BPF: [ 1305.431517][ T3350] BPF:Invalid return type [ 1305.435218][ T3348] BPF:, vararg [ 1305.435865][ T3350] BPF: [ 1305.435865][ T3350] [ 1305.444197][ T3348] BPF:) [ 1305.449316][ T3348] BPF: [ 1305.452099][ T3348] BPF:Invalid return type [ 1305.457622][ T3348] BPF: [ 1305.457622][ T3348] [ 1305.463181][ T3351] BPF:[1] FUNC_PROTO (anon) [ 1305.468215][ T3351] BPF:return=160 args=( [ 1305.473207][ T3351] BPF:0 (anon) [ 1305.477336][ T3353] BPF:[1] FUNC_PROTO (anon) [ 1305.482066][ T3351] BPF:, 0 (anon) [ 1305.485675][ T3353] BPF:return=17152 args=( [ 1305.490478][ T3351] BPF:, 3 (invalid-name-offset) [ 1305.495956][ T3353] BPF:0 (anon) [ 1305.499861][ T3351] BPF:) [ 1305.502699][ T3353] BPF:, vararg [ 1305.506197][ T3351] BPF: [ 1305.509307][ T3353] BPF:) [ 1305.512215][ T3351] BPF:Invalid return type 06:51:43 executing program 5: openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpuset.memory_migrate\x00', 0x2, 0x0) 06:51:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x9, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0x20}}, 0x0) 06:51:43 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='keyring\x00', 0x0, &(0x7f0000000180)="f1", 0x1, r0) 06:51:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x300, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1305.517974][ T3353] BPF: [ 1305.527468][ T3353] BPF:Invalid return type [ 1305.532768][ T3351] BPF: [ 1305.532768][ T3351] [ 1305.543324][ T3353] BPF: [ 1305.543324][ T3353] [ 1305.660539][ T3365] BPF:[1] FUNC_PROTO (anon) [ 1305.665472][ T3365] BPF:return=768 args=( [ 1305.670841][ T3365] BPF:0 (anon) [ 1305.674355][ T3365] BPF:, 0 (anon) [ 1305.678650][ T3365] BPF:, 3 (invalid-name-offset) [ 1305.683911][ T3365] BPF:) [ 1305.687200][ T3365] BPF: [ 1305.690043][ T3365] BPF:Invalid return type [ 1305.694476][ T3365] BPF: [ 1305.694476][ T3365] [ 1305.701624][ T3368] BPF:[1] FUNC_PROTO (anon) 06:51:43 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@newtclass={0x2c, 0x28, 0x300, 0x70bd2c, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x0, 0xfff1}, {0x0, 0x1ffeb}, {0x1}}, [@TCA_RATE={0x6, 0x5, {0x1, 0x2}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24000000}, 0x20008810) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@newtaction={0x60, 0x30, 0xfffd, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_ife={0x48, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x4}, 0xffff}}]}, {0x4, 0xa}, {0xc}, {0xc}}}]}]}, 0x60}}, 0x0) 06:51:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x4800, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:43 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000100)={'security\x00', 0x4, "c0b0d573"}, &(0x7f00000001c0)=0x28) 06:51:43 executing program 5: getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000002c0)) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, 0x0) 06:51:43 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000180)) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000100)={0x21}) [ 1305.716601][ T3368] BPF:return=768 args=( [ 1305.720781][ T3368] BPF:0 (anon) [ 1305.724176][ T3368] BPF:, 0 (anon) [ 1305.729260][ T3368] BPF:, 3 (invalid-name-offset) [ 1305.734127][ T3368] BPF:) [ 1305.751143][ T3368] BPF: [ 1305.762515][ T3368] BPF:Invalid return type [ 1305.780215][ T3368] BPF: [ 1305.780215][ T3368] [ 1305.794799][ T3378] BPF:[1] FUNC_PROTO (anon) [ 1305.812114][ T3378] BPF:return=18432 args=( [ 1305.826308][ T3378] BPF:0 (anon) 06:51:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x500, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:43 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00', 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x6) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)={0x1c, r0, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x1c}}, 0x0) [ 1305.831550][ T3378] BPF:, vararg [ 1305.835372][ T3378] BPF:) [ 1305.842068][ T3378] BPF: [ 1305.848231][ T3378] BPF:Invalid return type [ 1305.865872][ T3378] BPF: [ 1305.865872][ T3378] 06:51:43 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) 06:51:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet6(r0, &(0x7f0000001dc0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000040)="92", 0x1}], 0x1}}], 0x1, 0x0) [ 1305.880527][ T3393] BPF:[1] FUNC_PROTO (anon) 06:51:43 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)={0x0, 0x0, "f415f4"}) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000000)={0x0, "4f831e23152cc4b5f25aa37fb4f8f61622b941db24eb538718025de73e46f2ba"}) recvmmsg(0xffffffffffffffff, &(0x7f0000005840), 0x0, 0x0, 0x0) [ 1305.910254][ T3393] BPF:return=18432 args=( [ 1305.913886][ T3396] BPF:[1] FUNC_PROTO (anon) [ 1305.927757][ T3393] BPF:0 (anon) [ 1305.935403][ T3396] BPF:return=1280 args=( [ 1305.951914][ T3393] BPF:, vararg [ 1305.952295][ T3396] BPF:0 (anon) 06:51:43 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x7fff, 0x4, &(0x7f0000001bc0)=[{&(0x7f00000009c0)="bc87dc6f390e6c150abfd1739a", 0xd}, {&(0x7f0000000a80)="e62fad", 0x3, 0xffff}, {&(0x7f0000000ac0)='~', 0x1, 0xffffffffffffff7f}, {&(0x7f0000000bc0)="cd994c3c35ffbfe974cf05c9eaef1d1bf489ec2d9e588688f44bf3d915309b0da7c1e4546c12850a27482c2f06c879e8c57c57dab5ec874dc3ad3d7c8cba4343a026677cd555e24c89a7de55886a0157592af7c0cc41f7532af9bb2b1c20dc59ec74e7316029c18feada4044977abbb3d62c7de1b4549d140d8af43287f784f330eccd78b2a1e1f9dc581929c9aef78470369eab45572dc94f16e9fa0e3b47a337a8c1b11fbe9f7f28a9c4dcac152db677b898982ee3a2078b8564e6e78f02a557b3f425d8ef3fcf52797dbd3aa640572aa5275f0e3221b4828d866a1df2d268f81167905a33bba4341f775dd2643930b6decb705a564a7bb36cf382f20f61d84cd1b6b5daec4dedbca4e1adc2d1d7a65c3e41dd2470e6ba11bcac7aa10c9aa2ea193300eeb9bb12ade7813dc4d637201f1bc9987c8742c29af0371e8de67fb45a88a12bf1b00d6e7c7101104475ccefb1ebfd699472da9dffc5354c06f8aeaa1c7e434d0c1013cb4ef3ebb3952cfd4b3d6b46b3eac19938ab40dc0b6ad78e8af868252b2fd8ba6b97eefef1a03686d0e1e0c44a70b65e7ac342a0f527a857600f0fb3a276f3644e8a1a48b35fd784929ae62d5a8ffc20111390d10b9029f078129e2c2542064d28d70cedf29186c8f970c154b2298ea3c4a3de1dca2e6e58f93feb114a97b6d9c6a3a1bc7856973c46d0484a74872e9c26d0eb950de39d57dba827082b61f991cdc3617a9bd8fc25f1370732abc3eeb6eafb40cf1bd80f3cab5a22b111c24221fdcf482988285c520eb94fdddaf9d082cd71e2643864b40d5002bb55feaf68234addde0caa3e697705d1ce47b43fb4b34fe1cfc6cd7e71829988fe273268535b4f6d048e1f3b2313a23308abe2a59299081741cd01e3313aa50c21bfb3c670ccc080d870e3d3e4c053074f43db17b7257d18d56b8babe37a26f7495d999f5303e822a297285f2800b08a07cf7fe36d478f48454564d43b30700782178d83518b0beb53d568854cdcc7a59080e179df1b5ab3cc3e74e9167af8e63e3a07540a887f1dbd07e67926f3c92fdd9656a1c57f29dd8c9bcbb49e3a74ee91fa693327aec5cf94c742231054cf9340c0370e03001c532747622adaa27ca52c2d0a9b02be096378fe0ac1196766518182c044e4f7a38a56b2477afbc44b2021df380eb475b7ede840379d9de5c32ece2cb054fae4d7b7d161ffbaa042c4d7888322a08ca16ff3c27c899f5517dfd8cadc4ca34f0d6d0b197f302cd6c6fdbc67099a9b60a547ef997f91d71b5259c0d6ba3b3b083366b1b8f6fdc952981adca97b348b2525a2ee19e6af0177d32c12f4b2f10c7af002ad57ef9e200dd21c2fce54db90f639958334f9db91d1866edc4e36024f1d89374bc85e404013d6d430cbbbb0b9344ab249b2bddeab6fe75cd9ab88aabdb2854bc1bdb32e8ed18602d8e37f0d4a06130a432640faa23830d55a1beb8a655438c155a0a0586b1389666dc066023d5c2cd8284019d9e9f2d4123ef9df56993ec662e781432c781a12a652", 0x441}]) [ 1305.963592][ T3393] BPF:) [ 1305.985027][ T3393] BPF: [ 1305.994707][ T3393] BPF:Invalid return type [ 1306.003121][ T3396] BPF:, 0 (anon) [ 1306.008629][ T3393] BPF: [ 1306.008629][ T3393] [ 1306.024043][ T3396] BPF:, 3 (invalid-name-offset) 06:51:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x4c00, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x28, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}]}, 0x28}}, 0x0) [ 1306.040553][ T3396] BPF:) [ 1306.049407][ T3396] BPF: [ 1306.064594][ T3396] BPF:Invalid return type [ 1306.072892][ T3396] BPF: [ 1306.072892][ T3396] 06:51:43 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2={0xfc, 0x2, [], 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa80122}) 06:51:43 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001600)={'team0\x00', 0x0}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/full\x00', 0x309403, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r2, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/full\x00', 0x309403, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000001680)={0x0, 0xffffffffffffa1aa, @status={[0x2, 0x6, 0x7fff, 0x3, 0x4]}, [0x3, 0x8, 0xb7f, 0x1f, 0xfffffffffffff000, 0x1, 0x1, 0x1f, 0x4, 0xb1, 0x3, 0x0, 0x4, 0x64, 0xff, 0x0, 0x0, 0xf67, 0x1000, 0x140000000, 0x4, 0xffffffffffffff3b, 0xbc5, 0x9, 0xfff, 0x3129, 0x2, 0x4, 0x6, 0x0, 0x3f, 0x8, 0x4, 0xfffffffffffffff9, 0xba46, 0x3b, 0x6, 0x3, 0x6, 0x2, 0x7fffffff, 0x0, 0x100000000, 0x5, 0x7f, 0x7, 0x9, 0x40, 0x100000001, 0x8, 0x0, 0x6, 0x8000, 0x0, 0xfffffffffffff001, 0x100000001, 0x4, 0x10000, 0x5, 0x9, 0x3ff, 0x6, 0x0, 0x80000001]}) sendmsg$BATADV_CMD_SET_VLAN(r3, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000080)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f0000000280)={{r3}, r4, 0xa, @unused=[0x100, 0x7, 0x40000000000000, 0x6], @name="ffc9949bacd433b4109676ef21ee30a642f11486ce0d01d9f3be82b504732ae55d320c79fea15cd9f6d02ec0ce5e0af16464aa9551b72a58e74ee3d48038642f75169200201d635a73fadef7695b773900f508052148b14639f6845b5185a9a9352290a34ce3d43dc7c882d06cd61f032e9d0f1a711fa07ed0c0733c790f951a7d5a72838d9694ba6ba48ac46da72a1f76f39b343eb436f9811f3b0150bbd0a5f06d49927300f53649dfc8628af66cce5ad8c7e9965dd3b94efece24810cc25dc1af90b19cd8cbdd33993f97ac05f9706e41a8124ae800d74ce4d77c2c436d51f6078ea21c6b28850a5bd7708518aec8f8fa6ac2a4acadd94a562fffbbcadebd05dc4ba7bdd1a518d17872f18ce894808ea457774ff31f85704fe4939a381a083f96c0055c63e6ae74700600821e9a13b143f3874dc865e2449f8776a244777043dabc2d2fd4085a62c9e60e09c303334818e17f4cfdb1b4694f1c60a05dd552f3a0462e7b8ea2dc90474e2eed5e28cb4b7fff61febfd9bd4aaaf0aed97e6d04ba838fd432b2901c0d0aef6f26168d1b1094198a13c261e685fd481be3f3612b12135d6a568a2c08c2bbf1716adc46b5b800083ad60da7a6e24cefea89d1c214a195d4652186f54385712fc8fc7bb7747549937a8d970fec5c517fd7a0cc9ea4fbae38d2abf4c166d56f637e589b5ea81751e4e9f6996336bf2d23f8463124c5cbde267cb8f00e663a6147522f1372c13e1fcdaf8ad97aac3c01552936e9b30935d1c0db4a8663cda67f6e5059a9958cbf50581cad84c6fa1e9e97b0ea649df07c593e37e5c51f27ed56e2a3cd6955590ec07038e0aa8a29bf168da35c6eee02fdddb48d5480b1c14bdf3f3d4fd10418430727143b7d68959a12fc52a2184485fe58f8fd035b98d08d786bbf0de470d2686518e08b5c0a786af1de70a88b450332a3943aa7771cd5e164f5b1765a2c62211b197eb208d065ff471742f614857cd748a4551eaa4a6e6f641c5cc0a8d5f0b2b0af4685c204c603f8aea9d7929634cfe8cd211122517a90e716ec7fcaeb159897e27787e2ee43861071b33928414e1660e358e9ebcfad15888fadeeb3007e9e93c8bdda8caa5c650885c85ef1703371cfd1698756b7ae457b99022e2f59224bdde30ac34b5db0b27efb9a93c6fb8b944ef37488d509d155f50f1dc8982d96ebe61be3e3929f697d1d569e6eac265a355a672d0a86c25ca23208198cf0ee7ca755550381740521103072d9766ada44af040c8378212cdc06a1127f713c2cf6c8f1df45c6683ddd7015ef0e038454b4ad249248b494b76d415100e733abbf8d1b1322e138592c8524fdc5950f4cad1f026749950d54e460ac4d7505a11fdfd1fbd6aaa315f86794195f12f6da2ead8f734185e2f815df12d0f268d5bf65ada6c9e972e1e37209d778d802f9e0e1f6fe28f5013901b4eab1ff7781db9080def94f1e9bba659192b2f90472197fb1c8a11472f9ea43d0cf2fce95d182441565e57d05495f0197431300c4533acecdd455d084b08fff85b1321f15fc5336f16f13dd7937e90dec0cc9fe78ed564fed5ef8741263d4d3f1f9d9cbc56f85b1e06d65790309f2078532fe5ef85b3e033ffa234e6730a089e441aca07f80cc830bf79a940720b9073f1b4a7b9d51fde30e2da84f0728c50be58f2b3352b9bc7858dd63741d5d73f23fbd7783cef45c5621aebc6bd0a17762ea1b7865633b14671364f026297c851276ea7f73a9a0171ee5a4dd29f4d4adfeadc8f50d851f20da4b0015f58c21113f038d4904af6310600468e04a5e231a590048ea3c6d8978540c43171a4174b341d119eaf816b978ef15fcb542f374b964afff0116156032c254a17a52c3b97eac4896d3287c3ea814da4a34ce4a265a815311d3fb16b1d305bae36decb3fb3871eec9374391c9357c773f8573c0d121d4dd9921518e26dc0a4f6cfc8b3dcf3d607e4e5ee1518dcd762113de344b6d9049be33777af8fa8a6e5d6245013172f4ebe795f42a9c1a13927e978be8887ca88f111071408aba1a9610a5198e6bea0c58aa4f0d488af027689eb213bddb4b67f9b49b5fa98be8804d449e5611c0d323eb680c2ca8d83cb27f415813f433adf4a73f52f020862911544adb6dcf083a9b153b8a380bfc9322a42fffad3987d4d6a5f670cf9b049796bc1f9284f36d405b7486866ce8010398c5012c467f64d682072532c6386d1c5b97cfe6f88cec9689b1cc441961290b3b616fe415bcd8a6b2938b5b67c69051fd0ec181141d412b09cd8a2b8aacfd1091b5fbb80c62edecfcec5c9fc8afc46d5ab65a718fa40f7b36b2668f9225c3a7a58ed2f1806e8427130d30ad1cf3b2d3d2e3dc0790e37eaa6e278cd2333cce32c85743b233c9b2c0727a9d19b40a26ef51040191740420718a949cda0fea2ee10907f4091a2bf140befe51831ad2b70fa107d6032c16c7ce53ec2bb3fa5804caecc04768ecbe42605d082d14adac28a4bfbd76dbed1b15edb533c28ace8e71830c2081f22b75f8cd4581a566be8bc4b90b7a829274cb97fbc715636df39d8f61edb86adbfd5495e4a2458ffeebd023166aac29f25370fbe9e9f8f2a5a570d8853a403cad10ec619995377ac1519e8049e6866184d9a1dee9e6b520d55f1629a1b20276a1cb72415b840a167467f73676649ef813d34dd7a02dce064697df683d5d6fb20fb48218c9dfe6b268a6a785f66afa2f4d43432803d45ca303d599325be7ad2e11d5db09d92bc13960cd4aeda137833bb09fe6c4ea326043d55c46d45c6cc944860535d54246682dbd2b9d110beb5973f09457fb2fa13d4caf656b608586c31bb538778357171220a32ef2528e3949238c6a1e30364b449d213e49c63c363e5401c47597be7dc64434ca59498c191dc59a8197600525f0d0b3af487beb22aa2d95505016fef47bb1c3177f8610af3256c0edbe28b9d00a51bca7c30dd595ac043de7861def90284be3c52b99ead9841caa7d1826fcafd1c2b3cc4e32a2ed15860fbe6076b58edd26ef7064aebf5dd195fb9539b29dcf0b90835c68facf3b65ca3f9237245aa85301cd7e05fbc3d52d56aa9ca119a27aab2acbcacfb3c157dade450a1ceadb9660b70bc966eb306aa92e422f160713a6b6ecc30ccb5a7f56333c47138dd2c1d78e000c8421b42e12c63ad32a14b00bf5adf7c0e3ee45b699be4af35f197f0e3cd1ea69a3183e336862caac98b622f27fa4e554dffc241be67cfb56551cdfa3b1e95e522c6539174138cfc805e5e6225219a0531ff93a53940e26dfc673d71f037774eb8666581df3f8ae5aac171e6aeb202fab1b1b4972d1f69b437e2f1e85c1fe1efe68cf68cd930b88f158fc73d22353b3197137afa60b5b76482075e66b7d5538813e91083d1d6fa8fada565c3dcaf14b1a8d00c69c78c7ad934f2b1d55e25f097c53807f657c65581daf8d200e539bf8a73e578b350411da6697fd3aafd9f56d7c694a199a48b95fb7e7e805d190b7351722f2079d32e04bfab470728c1ebc2b54bb4341bf1d4f460f95eb2e0090ddd597ebed5f119dc5d6ef5643dd8ff1a7159e6869e5b0b0c90c8e37871c536ae0d4c003d57426e09673a088a28f4eb4b904b39ecd9d5c9e222d9b3c1a071103f4bebb9900c2a5e085bed5fedb272d8a80d6cbf1300426ac07febb37c1a2785c5026d957e7ebdee00fade6d22f6f367c0cc45d9d6daa82bcf4830561af666aca5f1f5d482e0c9e0be80c4d66f0baf09967887d72bac4c9c4d1f6f8df807a0b5c4e09e7caba7c2ae84a05f84af15550b97cb46299141175cfce889a5177e4ee5f341bb0406056141181a23fa3cd7db1379e7ebed2d84264b921bc587fbdf9ea809ca839ca9bed07afcec81d185d9d93aeb7a6a67bd0b2646fc8dce034670d4297af4088bcb6127d25e78ed846ba45d75491ab539de7b1343ff470729070e5583b1c73e06e1b2a3c8a8e0e16aa2263b3b322ec9e27ee05decf0fd8a3b68fb63604a07d117ef94cf48fda6941280fdcdea0030143dd4d2ed56b1b59e9e9aee71cda8240b9ba36e69de4f6fb5dd5b6cfdf4947b9caf1961a5441abbc469cf422efdb6260a459c28991ffb84ad8224152185429b14cc281464dd7dbb112324d130d0939bba777ad0d58d7ebb1bc6bb7a07e82d03a8f4d22d8702396a4b110695b4171e827cf7ee287e26b6a1206ca6ffda6ec7e338380a82eea1f9a72fb3c17a0a005eab8f0f6827f4dc03069dccd65297740b81de7cad2d90b7657c9a374749b6885fad134a7426c2a2c1c5b2b0c51bcf0a1a02b93083b1c8ee27d043e6667c898724d38e9ab291cb646195b076fcb1fbf4ea898dd2a87b572f6e946f5ffaff3f46ae9390e912e8c38bf1a0a8d13291bd5f330f53954c0b96a44d6e9ff2d56106cbc759bec313c5fcc9a420bb02dc73ed9c4f020a8229fe79767f08433e5f20a3ac01e08bca065bcfbeab54b44e92b42d6a8e015ff71f71f27b32d5387f32952560c12e44a4c842627d296b0afee5a7a9d8ee005acd77bd3b960d5a7e87e0e2ffccea9a991763901b980d17c76e17fa0d84d3646c53d286543d7ef7073b631dac8050cdb7bb28c4739d32ce7d9ebf60739088d682babba4b431fb628495d487085c6499fe8a147fdc2557c501494c9c554e43a5c6a49b8b73bf9b4b7aca3f1401c25bd516cf45f502e0f84bda80ce4180037f10c0bc2ee8dd6d70371dac569b69f5bf6e26378188e6541be075e539c43a2ab1190b5de4393fb009bfb3ef5216bb28433b8b1f0673ddf51d2af2fb9722d65fe67c939d3e2709ec00bb49b20122079f537d08ec44cdc712675062e5648a5bd5cacbc2faba6448c0bc35801d3a061477726f193f9beecae021d6f7b97cf08f25a0d56c1977a5992422c7f9a5dd5775520cf9abfe3be19b7b05b337c9f4ded794487749b28918d42643c18186b036e7b3aaedaa087c6ba65fb21c893b508492ef1b7589dfcf8d91e14843f1927ff041173c335dfd8b912222ed0739400fec7f35500d8ec0a7ab82058fa2d607ef00a373d0c09da4dd09b23a60bbb821ca1982c9a5841d214224970c8827ff9bfac851eebf0e1028d413b4e0641df3f3feee0f65779dead36522305bd0a617bd2ee05c89c7c4537f74b6ebf185bc60890b2120d53b0c6c1ed0cf61f5c56111697820ba0b236517462f098b7b81b12246640d16e228e15fb167abfd25a6c6b05de493c0fa796ba4e5e37de03a615516c2bef7554776c5f4653b3283084eb1c9cd2a83cc468f6fa87fef746f4d44edcac619baf3c454178bc5fca5680a8348f196ea988ae984c441401e58d78f7af800144add9175b4fae4b98a6ee6e934fa9bbbc075e5641d601a4222320acb4c5342e74a29c92f1786f0c5bac7372f7d6b9f1a230fa959dff924f250c3338f2d5710edf1ec9576d83d14703b3147212177f71b3f6699d3875d4f35e5c5c1d9caf5c6befc7e68eac531b8dbcd8845b042f8a3d88b073a73ff76180f5341479810d1ff6449842ea02f8e78ff0ae876874d0086af9d0ce37caa41cbb203d3a05a31aff1dfaaf824391be421362f0c670ba29f6d78d1cdf2d6505f28d13a4e0009061cbbea221ece820374b9992f233df9ea254478d96a1fa882f1e4fae90927a03341bd60f000d3a2c312fce6a6e9507ff89e9fdbf8215a47315cf3c093b3b7cf6af63e5611367e55a547cefba"}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001640)={@ipv4={[], [], @remote}, 0x34, r1}) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0x29}, 0x5}, {0xa, 0x4e24, 0x80000001, @remote}, 0x2, [0xffff, 0x3, 0xfffff30b, 0x7, 0x9, 0x6, 0xafd, 0x6]}, 0x5c) [ 1306.090079][ T3425] BPF:[1] FUNC_PROTO (anon) [ 1306.096899][ T3425] BPF:return=19456 args=( [ 1306.101699][ T3425] BPF:0 (anon) [ 1306.105496][ T3425] BPF:, vararg [ 1306.110331][ T3426] BPF:[1] FUNC_PROTO (anon) [ 1306.113552][ T3425] BPF:) [ 1306.130831][ T3426] BPF:return=1280 args=( [ 1306.140941][ T3426] BPF:0 (anon) [ 1306.147096][ T3425] BPF: [ 1306.151854][ T3426] BPF:, 0 (anon) [ 1306.152007][ T3425] BPF:Invalid return type [ 1306.164011][ T3426] BPF:, 3 (invalid-name-offset) [ 1306.173469][ T3425] BPF: [ 1306.173469][ T3425] [ 1306.182518][ T3426] BPF:) 06:51:44 executing program 0: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00', 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x6) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)={0x14, r0, 0x1}, 0x14}}, 0x0) [ 1306.196529][ T3426] BPF: [ 1306.199704][ T3436] BPF:[1] FUNC_PROTO (anon) [ 1306.210003][ T3436] BPF:return=19456 args=( [ 1306.215518][ T3436] BPF:0 (anon) [ 1306.220325][ T3426] BPF:Invalid return type [ 1306.220629][ T3436] BPF:, vararg [ 1306.229047][ T3436] BPF:) [ 1306.232185][ T3436] BPF: [ 1306.235512][ T3436] BPF:Invalid return type [ 1306.244283][ T3436] BPF: 06:51:44 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2={0xfc, 0x2, [], 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa80122}) [ 1306.244283][ T3436] [ 1306.245022][ T3426] BPF: [ 1306.245022][ T3426] 06:51:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x600, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:44 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_THRESHOLD(r0, 0x8004510a, 0x0) 06:51:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x6000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1306.361642][ T3448] BPF:[1] FUNC_PROTO (anon) [ 1306.367811][ T3449] BPF:[1] FUNC_PROTO (anon) [ 1306.372265][ T3448] BPF:return=1536 args=( [ 1306.379153][ T3449] BPF:return=24576 args=( [ 1306.383736][ T3448] BPF:0 (anon) [ 1306.387432][ T3449] BPF:0 (anon) [ 1306.390864][ T3449] BPF:, vararg [ 1306.394461][ T3449] BPF:) [ 1306.398858][ T3449] BPF: [ 1306.399208][ T3448] BPF:, 0 (anon) [ 1306.401906][ T3449] BPF:Invalid return type [ 1306.409520][ T3448] BPF:, 3 (invalid-name-offset) [ 1306.410982][ T3449] BPF: [ 1306.410982][ T3449] [ 1306.421916][ T3448] BPF:) [ 1306.424721][ T3448] BPF: [ 1306.427627][ T3448] BPF:Invalid return type [ 1306.432415][ T3448] BPF: [ 1306.432415][ T3448] [ 1306.437387][ T3450] BPF:[1] FUNC_PROTO (anon) [ 1306.467660][ T3450] BPF:return=24576 args=( [ 1306.488211][ T3450] BPF:0 (anon) [ 1306.491949][ T3452] BPF:[1] FUNC_PROTO (anon) [ 1306.492484][ T3450] BPF:, vararg [ 1306.501607][ T3452] BPF:return=1536 args=( [ 1306.506438][ T3452] BPF:0 (anon) [ 1306.508785][ T3450] BPF:) [ 1306.512524][ T3452] BPF:, 0 (anon) [ 1306.516010][ T3450] BPF: [ 1306.517225][ T3452] BPF:, 3 (invalid-name-offset) [ 1306.520301][ T3450] BPF:Invalid return type [ 1306.525492][ T3452] BPF:) [ 1306.533605][ T3452] BPF: [ 1306.536884][ T3452] BPF:Invalid return type [ 1306.539408][ T3450] BPF: [ 1306.539408][ T3450] [ 1306.541516][ T3452] BPF: [ 1306.541516][ T3452] 06:51:44 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2={0xfc, 0x2, [], 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa80122}) 06:51:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000800)='ethtool\x00', r0) 06:51:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000300)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in={0x2, 0x4e23, @empty}}}, 0x90) 06:51:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000cc0)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_OURS={0x4c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x2d, 0x4, "3ca5ff819a7c3a27dba9b5043003334272f5a031ef728e3f4c17e7bead69f4dba8c10531dd8d5da475"}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_OURS={0xe54, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xe4d, 0x5, "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"}]}]}, 0xec4}}, 0x0) 06:51:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x6800, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x700, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:44 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@dev={0xfe, 0x80, [], 0xe}, @ipv4={[], [], @empty}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x0, 0x500, 0x0, 0x220}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000580)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000005c0)={@rand_addr=' \x01\x00', 0x5a, r1}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/full\x00', 0x309403, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r2, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/full\x00', 0x309403, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x3, 0x9, 0x0, 0x40, r2, 0x4, [], 0x0, r3, 0x0, 0x3, 0x3}, 0x40) [ 1306.835255][ T3461] BPF:[1] FUNC_PROTO (anon) [ 1306.852948][ T3467] BPF:[1] FUNC_PROTO (anon) [ 1306.854961][ T3461] BPF:return=1792 args=( [ 1306.871616][ T3461] BPF:0 (anon) 06:51:44 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2={0xfc, 0x2, [], 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa80122}) 06:51:44 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x5}, {0x6}]}) [ 1306.885418][ T3461] BPF:, 0 (anon) [ 1306.885932][ T3467] BPF:return=26624 args=( [ 1306.905328][ T3467] BPF:0 (anon) [ 1306.905979][ T3461] BPF:, 3 (invalid-name-offset) [ 1306.925370][ T3467] BPF:, vararg 06:51:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000001540)={0x0, 0xfe, [], [@padn={0x1, 0x2, [0x0, 0x0]}, @pad1, @calipso={0x7, 0x58, {0x0, 0x14, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @generic={0x0, 0x78e, "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"}]}, 0x800) [ 1306.936322][ T3461] BPF:) [ 1306.948345][ T3461] BPF: [ 1306.955699][ T3461] BPF:Invalid return type [ 1306.956006][ T3467] BPF:) [ 1306.978966][ T3467] BPF: [ 1306.983332][ T3461] BPF: 06:51:44 executing program 1: futex(0x0, 0x85, 0x0, 0x0, &(0x7f00000002c0), 0x4) 06:51:44 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@dev={0xfe, 0x80, [], 0xe}, @ipv4={[], [], @empty}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x0, 0x500, 0x0, 0x220}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000580)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000005c0)={@rand_addr=' \x01\x00', 0x5a, r1}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/full\x00', 0x309403, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r2, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/full\x00', 0x309403, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x3, 0x9, 0x0, 0x40, r2, 0x4, [], 0x0, r3, 0x0, 0x3, 0x3}, 0x40) [ 1306.983332][ T3461] [ 1306.989914][ T3467] BPF:Invalid return type [ 1307.004201][ T3467] BPF: [ 1307.004201][ T3467] [ 1307.030772][ T3483] BPF:[1] FUNC_PROTO (anon) 06:51:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000004c0)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="352728bd7000fedbdf2506"], 0x24}}, 0x0) [ 1307.051196][ T3483] BPF:return=1792 args=( [ 1307.051724][ T3490] BPF:[1] FUNC_PROTO (anon) [ 1307.073745][ T3483] BPF:0 (anon) [ 1307.082103][ T3490] BPF:return=26624 args=( [ 1307.091638][ T3483] BPF:, 0 (anon) 06:51:44 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000140), 0x10) [ 1307.110995][ T3490] BPF:0 (anon) [ 1307.113649][ T3483] BPF:, 3 (invalid-name-offset) [ 1307.124094][ T3490] BPF:, vararg [ 1307.132691][ T3483] BPF:) [ 1307.150983][ T3490] BPF:) [ 1307.152148][ T3483] BPF: 06:51:44 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@dev={0xfe, 0x80, [], 0xe}, @ipv4={[], [], @empty}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x0, 0x500, 0x0, 0x220}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000580)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000005c0)={@rand_addr=' \x01\x00', 0x5a, r1}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/full\x00', 0x309403, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r2, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/full\x00', 0x309403, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x3, 0x9, 0x0, 0x40, r2, 0x4, [], 0x0, r3, 0x0, 0x3, 0x3}, 0x40) 06:51:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000000)=ANY=[], 0x70) [ 1307.161880][ T3490] BPF: [ 1307.171559][ T3490] BPF:Invalid return type [ 1307.179898][ T3483] BPF:Invalid return type [ 1307.188056][ T3490] BPF: [ 1307.188056][ T3490] [ 1307.207683][ T3483] BPF: [ 1307.207683][ T3483] 06:51:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x900, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x6c00, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:45 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x7fff, 0x3, &(0x7f0000001bc0)=[{&(0x7f00000009c0)="bc", 0x1}, {0x0, 0x0, 0x8}, {&(0x7f0000000ac0)='~', 0x1, 0xffffffffffffff7f}]) 06:51:45 executing program 1: getitimer(0x0, &(0x7f0000000b00)) 06:51:45 executing program 5: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f00000008c0), 0x4) 06:51:45 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@dev={0xfe, 0x80, [], 0xe}, @ipv4={[], [], @empty}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x0, 0x500, 0x0, 0x220}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000580)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000005c0)={@rand_addr=' \x01\x00', 0x5a, r1}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/full\x00', 0x309403, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r2, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/full\x00', 0x309403, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x3, 0x9, 0x0, 0x40, r2, 0x4, [], 0x0, r3, 0x0, 0x3, 0x3}, 0x40) [ 1307.304496][ T3518] BPF:[1] FUNC_PROTO (anon) [ 1307.324965][ T3521] BPF:[1] FUNC_PROTO (anon) [ 1307.329772][ T3518] BPF:return=2304 args=( [ 1307.342607][ T3518] BPF:0 (anon) [ 1307.346995][ T3521] BPF:return=27648 args=( [ 1307.352031][ T3521] BPF:0 (anon) [ 1307.355802][ T3521] BPF:, vararg [ 1307.359639][ T3521] BPF:) [ 1307.361214][ T3518] BPF:, 0 (anon) [ 1307.362732][ T3521] BPF: [ 1307.369458][ T3521] BPF:Invalid return type 06:51:45 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001600)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001640)={@ipv4={[], [], @empty}, 0x0, r1}) 06:51:45 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x3}, 0x20) [ 1307.376432][ T3521] BPF: [ 1307.376432][ T3521] [ 1307.386662][ T3518] BPF:, 3 (invalid-name-offset) [ 1307.391623][ T3518] BPF:) [ 1307.394473][ T3518] BPF: [ 1307.397348][ T3518] BPF:Invalid return type [ 1307.401868][ T3518] BPF: [ 1307.401868][ T3518] [ 1307.411573][ T3530] BPF:[1] FUNC_PROTO (anon) [ 1307.431885][ T3532] BPF:[1] FUNC_PROTO (anon) [ 1307.439528][ T3532] BPF:return=2304 args=( [ 1307.470939][ T3530] BPF:return=27648 args=( 06:51:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000340)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x3}}}, 0x90) [ 1307.492330][ T3532] BPF:0 (anon) [ 1307.505695][ T3530] BPF:0 (anon) [ 1307.510562][ T3532] BPF:, 0 (anon) [ 1307.522144][ T3532] BPF:, 3 (invalid-name-offset) [ 1307.534484][ T3530] BPF:, vararg [ 1307.536354][ T3532] BPF:) 06:51:45 executing program 5: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0xe000) 06:51:45 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) recvfrom$llc(r0, 0x0, 0x0, 0x40002143, 0x0, 0x0) 06:51:45 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000340)={0x1, &(0x7f0000000200)=[{0x101}]}) [ 1307.545841][ T3532] BPF: [ 1307.554638][ T3532] BPF:Invalid return type [ 1307.562984][ T3530] BPF:) [ 1307.572818][ T3532] BPF: [ 1307.572818][ T3532] [ 1307.572964][ T3530] BPF: 06:51:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xa00, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1307.607936][ T3530] BPF:Invalid return type [ 1307.619598][ T3530] BPF: [ 1307.619598][ T3530] 06:51:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x7400, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:45 executing program 5: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/85) 06:51:45 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) inotify_rm_watch(r0, 0x0) 06:51:45 executing program 0: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="46f9caa4968217d2c2640f477efe852ffa3e47fc8fd1e51fb4b6b286e3ef3110b7e641172f2b6a7b3ed4d99154cfae784da7a0046fbd30ac242a50b69e3e0c34c3a147b4a5ee3e1b6178f639d72e98e93f68386b7eceff203a7d5bc3a57324853ff0aae62ca6bb31f7f43e2b086c22c403f3ecc2604aa70a62cda64486de7a6c649d062fc26d0ceb34b7896a56946ab7afbcf81b0ecf10f1fcf24480d149dd104de96c1729c4be0ddf4c98988ade9b2b3be685e26cf33dd8db40662a2456e4487206da0c151ff6a8fa9d402e6d071a0a0b44cde7654d99bd5bedeb56bc3de15e35725b0e2297ac2c34e517d9d40805567a", 0xf1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000180)={0x0, r0}, &(0x7f00000001c0)=""/65, 0x41, &(0x7f00000002c0)={&(0x7f0000000240)={'xcbc-aes-neon\x00'}, &(0x7f0000000280)="995efcc7093605c01eba4293af25139ac5ecd76f5b9ed84c9246f49d29ec350c6536a22c3470a0fb6e8c8faae7daeedb47f6fa7e86596c9e2327723e8a7e8f", 0x3f}) shmctl$IPC_STAT(0xffffffffffffffff, 0x2, &(0x7f0000000300)=""/97) ioctl$SIOCX25GDTEFACILITIES(0xffffffffffffffff, 0x89ea, &(0x7f0000000380)) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x28800800}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x5c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4b}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xf216}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x38}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x80}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x200048c0}, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dlm_plock\x00', 0x101100, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000005c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000580)={0xffffffffffffffff}, 0x1, 0xffffffffffffffff, 0x1c, 0x1, @in6={0xa, 0x4e20, 0x10000, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000680)={0x11, 0x10, 0xfa00, {&(0x7f0000000540), r3}}, 0x18) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000700)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000840)={&(0x7f0000000740)={0xcc, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0xcc}}, 0x48810) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/dlm_plock\x00', 0x121000, 0x0) 06:51:45 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)=@secondary='builtin_and_secondary_trusted\x00') [ 1307.717892][ T3555] BPF:[1] FUNC_PROTO (anon) [ 1307.722559][ T3555] BPF:return=2560 args=( [ 1307.750776][ T3555] BPF:0 (anon) [ 1307.759478][ T3570] BPF:[1] FUNC_PROTO (anon) [ 1307.761203][ T3555] BPF:, 0 (anon) 06:51:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 06:51:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@dev, @ipv4={[], [], @empty}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44480010}) [ 1307.786671][ T3555] BPF:, 3 (invalid-name-offset) [ 1307.789307][ T3570] BPF:return=29696 args=( [ 1307.800685][ T3570] BPF:0 (anon) [ 1307.806821][ T3555] BPF:) [ 1307.816940][ T3555] BPF: [ 1307.830359][ T3555] BPF:Invalid return type [ 1307.831631][ T3570] BPF:, vararg [ 1307.838991][ T3563] could not allocate digest TFM handle xcbc-aes-neon [ 1307.847268][ T3570] BPF:) [ 1307.855437][ T3570] BPF: [ 1307.860446][ T3555] BPF: [ 1307.860446][ T3555] [ 1307.865520][ T3570] BPF:Invalid return type [ 1307.865860][ T3563] could not allocate digest TFM handle xcbc-aes-neon [ 1307.881226][ T3570] BPF: [ 1307.881226][ T3570] 06:51:45 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', 0x0, &(0x7f0000000080)="b574", 0x2, r0) 06:51:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001600)={'team0\x00'}) 06:51:45 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_THRESHOLD(r0, 0x80045105, 0x0) [ 1307.933414][ T3591] BPF:[1] FUNC_PROTO (anon) [ 1307.942939][ T3591] BPF:return=29696 args=( [ 1307.946633][ T3587] BPF:[1] FUNC_PROTO (anon) [ 1307.953170][ T3587] BPF:return=2560 args=( [ 1307.956612][ T3591] BPF:0 (anon) [ 1307.966009][ T3591] BPF:, vararg [ 1307.978717][ T3591] BPF:) 06:51:45 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) [ 1307.980573][ T3587] BPF:0 (anon) [ 1307.990867][ T3591] BPF: [ 1307.995544][ T3587] BPF:, 0 (anon) [ 1308.010046][ T3587] BPF:, 3 (invalid-name-offset) [ 1308.010837][ T3591] BPF:Invalid return type [ 1308.032260][ T3587] BPF:) [ 1308.038249][ T3591] BPF: [ 1308.038249][ T3591] [ 1308.051786][ T3587] BPF: [ 1308.066601][T16747] Bluetooth: hci0: command 0x0401 tx timeout [ 1308.079894][ T3587] BPF:Invalid return type [ 1308.084383][ T3587] BPF: [ 1308.084383][ T3587] 06:51:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xb00, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0xc, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 06:51:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet6(r0, &(0x7f0000007140)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00'}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000080)="a2", 0x1}, {0x0}], 0x2}}, {{&(0x7f0000000480)={0xa, 0x0, 0x0, @private1}, 0x1c, &(0x7f0000001780)}}], 0x2, 0x20000004) 06:51:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x7a00, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{}], r1, 0x1, 0x1, 0x48}}, 0x20) 06:51:45 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDCTL_MIDI_PRETIME(r0, 0xc0046d00, &(0x7f0000000040)) 06:51:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x28, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_AF={0x6}]}]}, 0x28}}, 0x0) [ 1308.201825][ T3613] BPF:[1] FUNC_PROTO (anon) [ 1308.207983][ T3613] BPF:return=31232 args=( [ 1308.214501][ T3617] BPF:[1] FUNC_PROTO (anon) [ 1308.219670][ T3613] BPF:0 (anon) [ 1308.223486][ T3617] BPF:return=2816 args=( [ 1308.228500][ T3613] BPF:, vararg [ 1308.232477][ T3617] BPF:0 (anon) [ 1308.237896][ T3613] BPF:) [ 1308.241241][ T3613] BPF: 06:51:46 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getpeername$inet6(r0, 0x0, 0x0) 06:51:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@mcast2, @mcast1, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2060086}) [ 1308.255492][ T3617] BPF:, 0 (anon) [ 1308.263587][ T3613] BPF:Invalid return type [ 1308.273332][ T3617] BPF:, 3 (invalid-name-offset) 06:51:46 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000001bc0)=[{&(0x7f0000000bc0)="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", 0x200}]) [ 1308.306150][ T3613] BPF: [ 1308.306150][ T3613] [ 1308.315050][ T3617] BPF:) [ 1308.318847][ T3617] BPF: [ 1308.322111][ T3617] BPF:Invalid return type [ 1308.330354][ T3617] BPF: [ 1308.330354][ T3617] [ 1308.336196][ T3626] BPF:[1] FUNC_PROTO (anon) [ 1308.343385][ T3626] BPF:return=31232 args=( [ 1308.350362][ T3626] BPF:0 (anon) [ 1308.354631][ T3628] BPF:[1] FUNC_PROTO (anon) [ 1308.360699][ T3626] BPF:, vararg [ 1308.364548][ T3626] BPF:) [ 1308.368419][ T3628] BPF:return=2816 args=( [ 1308.373351][ T3626] BPF: [ 1308.377944][ T3628] BPF:0 (anon) [ 1308.382036][ T3626] BPF:Invalid return type [ 1308.393004][ T3628] BPF:, 0 (anon) [ 1308.399038][ T3626] BPF: [ 1308.399038][ T3626] 06:51:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000ac0)={'batadv_slave_0\x00'}) 06:51:46 executing program 0: shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) [ 1308.404540][ T3628] BPF:, 3 (invalid-name-offset) 06:51:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xa000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xc00, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1308.456847][ T3628] BPF:) [ 1308.467416][ T3628] BPF: [ 1308.473706][ T3628] BPF:Invalid return type [ 1308.487862][ T3628] BPF: [ 1308.487862][ T3628] [ 1308.545763][ T3643] BPF:[1] FUNC_PROTO (anon) [ 1308.552728][ T3643] BPF:return=40960 args=( [ 1308.567172][ T3643] BPF:0 (anon) [ 1308.571303][ T3643] BPF:, vararg [ 1308.579219][ T3643] BPF:) [ 1308.582177][ T3643] BPF: [ 1308.585148][ T3643] BPF:Invalid return type [ 1308.589791][ T3643] BPF: [ 1308.589791][ T3643] [ 1308.598906][ T3644] BPF:[1] FUNC_PROTO (anon) [ 1308.599097][ T3645] BPF:[1] FUNC_PROTO (anon) [ 1308.608228][ T3644] BPF:return=3072 args=( [ 1308.608242][ T3644] BPF:0 (anon) [ 1308.608249][ T3644] BPF:, 0 (anon) [ 1308.608258][ T3644] BPF:, 3 (invalid-name-offset) [ 1308.612726][ T3645] BPF:return=40960 args=( [ 1308.621633][ T3644] BPF:) [ 1308.627877][ T3645] BPF:0 (anon) [ 1308.636356][ T3645] BPF:, vararg [ 1308.637323][ T3644] BPF: [ 1308.641409][ T3645] BPF:) [ 1308.645598][ T3645] BPF: [ 1308.646109][ T3644] BPF:Invalid return type [ 1308.648762][ T3645] BPF:Invalid return type [ 1308.662101][ T3644] BPF: [ 1308.662101][ T3644] [ 1308.672636][ T3645] BPF: [ 1308.672636][ T3645] [ 1308.680210][ T3647] BPF:[1] FUNC_PROTO (anon) [ 1308.691545][ T3647] BPF:return=3072 args=( [ 1308.700472][ T3647] BPF:0 (anon) [ 1308.719644][ T3647] BPF:, 0 (anon) [ 1308.724248][ T3647] BPF:, 3 (invalid-name-offset) [ 1308.731046][ T3647] BPF:) [ 1308.733952][ T3647] BPF: [ 1308.737331][ T3647] BPF:Invalid return type [ 1308.741887][ T3647] BPF: [ 1308.741887][ T3647] 06:51:46 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x802400, &(0x7f0000000200)) 06:51:46 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vim2m\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 06:51:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private2}], 0x1c) 06:51:46 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x4, &(0x7f0000001bc0)=[{&(0x7f00000009c0)="bc", 0x1}, {&(0x7f0000000a80)="e62f", 0x2, 0xffff}, {&(0x7f0000000ac0)='~', 0x1, 0xffffffffffffff7f}, {&(0x7f0000000bc0)="cd994c3c35ffbfe974cf05c9eaef1d1bf489ec2d9e588688f44bf3d915309b0da7c1e4546c12850a27482c2f06c879e8c57c57dab5ec874dc3ad3d7c8cba4343a026677cd555e24c89a7de55886a0157592af7c0cc41f7532af9bb2b1c20dc59ec74e7316029c18feada4044977abbb3d62c7de1b4549d140d8af43287f784f330eccd78b2a1e1f9dc581929c9aef78470369eab45572dc94f16e9fa0e3b47a337a8c1b11fbe9f7f28a9c4dcac152db677b898982ee3a2078b8564e6e78f02a557b3f425d8ef3fcf52797dbd3aa640572aa5275f0e3221b4828d866a1df2d268f81167905a33bba4341f775dd2643930b6decb705a564a7bb36cf382f20f61d84cd1b6b5daec4dedbca4e1adc2d1d7a65c3e41dd2470e6ba11bcac7aa10c9aa2ea193300eeb9bb12ade7813dc4d637201f1bc9987c8742c29af0371e8de67fb45a88a12bf1b00d6e7c7101104475ccefb1ebfd699472da9dffc5354c06f8aeaa1c7e434d0c1013cb4ef3ebb3952cfd4b3d6b46b3eac19938ab40dc0b6ad78e8af868252b2fd8ba6b97eefef1a03686d0e1e0c44a70b65e7ac342a0f527a857600f0fb3a276f3644e8a1a48b35fd784929ae62d5a8ffc20111390d10b9029f078129e2c2542064d28d70cedf29186c8f970c154b2298ea3c4a3de1dca2e6e58f93feb114a97b6d9c6a3a1bc7856973c46d0484a74872e9c26d0eb950de39d57dba827082b61f991cdc3617a9bd8fc25f1370732abc3eeb6eafb40cf1bd80f3cab5a22b111c24221fdcf482988285c520eb94fdddaf9d082cd71e2643864b40d5002bb55feaf68234addde0caa3e697705d1ce47b43fb4b34fe1cfc6cd7e71829988fe273268535b4f6d048e1f3b2313a23308abe2a59299081741cd01e3313aa50c21bfb3c670ccc080d870e3d3e4c053074f43db17b7257d18d56b8babe37a26f7495d999f5303e822a297285f2800b08a07cf7fe36d478f48454564d43b30700782178d83518b0beb53d568854cdcc7a59080e179df1b5ab3cc3e74e9167af8e63e3a07540a887f1dbd07e67926f3c92fdd9656a1c57f29dd8c9bcbb49e3a74ee91fa693327aec5cf94c742231054cf9340c0370e03001c532747622adaa27ca52c2d0a9b02be096378fe0ac1196766518182c044e4f7a38a56b2477afbc44b2021df380eb475b7ede840379d9de5c32ece2cb054fae4d7b7d161ffbaa042c4d7888322a08ca16ff3c27c899f5517dfd8cadc4ca34f0d6d0b197f302cd6c6fdbc67099a9b60a547ef997f91d71b5259c0d6ba3b3b083366b1b8f6fdc952981adca97b348b2525a2ee19e6af0177d32c12f4b2f10c7af002ad57ef9e200dd21c2fce54db90f639958334f9db91d1866edc4e36024f1d89374bc85e404013d6d430cbbbb0b9344ab249b2bddeab6fe75cd9ab88aabdb2854bc1bdb32e8ed18602d8e37f0d4a06130a432640faa23830d55a1beb8a655438c155a0a0586b1389666dc066023d5c2cd8284019d9e9f2d4123ef9df56993ec662e781432c781a12a65262cc1a761daa9a4447cf09deb74194946a966766abdb46a282f623d5f5798deb36f98da9e6c8a738316c39fcdf917acb0934461057769db0c3dd5598db0171018adb9f8fc44dddb535a2a88c7ee5804d9942026a1e2e162a54d2e345e56b551516d46aa35e531145be623467415869e9235dbae83e750771b5e7642183115c2a39271b4468c95e073b772bc134b00625dbb0fa6e2afe51d75035dd0dcb7693909b01fc731bdd0a0fbcab32240166dd2473a6d367deb16388b53d69c22596dea5364528fdc19aa7ee59e612578e82110aa862637b91955b50898b1436d3a9385872a96fdbf15f24152b0925a447db2ef6eda1e0e259b7dfa567b503ef64eabb517801346121bee41fee67bd536be34284e8b96edff6468827e01283a7192b30268ed4c98e1470aadb6ac51a3329c40ccdac6e0890aa031bce809497149e5c36a6f914d049cf60da16afce9f6e004253f3844a1f838668d833677c1ca350ca06a12dd151b7e0d51bff6a8c70812aa89a2342c7296588350ae2a7bd1dd5aa0530f26d45fd478aae69c9ee3e87ba3863ea260786ca6b52d5d577876ba30288316c6d2e754c5b1371eeeb56e10cf85f2537694ad73c05a6828ec206b97584bc1c4386a0a732f88d80a07d6e653fe19552a8d3582751a2eec447ffdef7062029abb1df5f83f35ab527198f4a641ce6bd4285868e75f98c6429abec746b49387a1c0bf9", 0x641, 0x8}]) 06:51:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xfffff, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xd00, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1309.041974][ T3656] BPF:[1] FUNC_PROTO (anon) [ 1309.049396][ T3656] BPF:return=1048575 args=( [ 1309.061002][ T3656] BPF:0 (anon) [ 1309.072527][ T3656] BPF:, vararg [ 1309.084991][ T3656] BPF:) 06:51:46 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, 0x0) [ 1309.092861][ T3656] BPF: [ 1309.099736][ T3660] BPF:[1] FUNC_PROTO (anon) [ 1309.109044][ T3656] BPF:Invalid return type [ 1309.115894][ T3660] BPF:return=3328 args=( [ 1309.128749][ T3656] BPF: [ 1309.128749][ T3656] [ 1309.138637][ T3660] BPF:0 (anon) 06:51:46 executing program 5: getresuid(&(0x7f0000000000), 0x0, 0x0) getresuid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) 06:51:46 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@link_local, @empty, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @broadcast, @initdev={0xac, 0x1e, 0x80, 0x0}, @local, @remote}}}}, 0x0) 06:51:47 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x81, 0x0) write$ppp(r0, &(0x7f0000000240)="831b9a0c73", 0x5) write$tun(r0, &(0x7f00000003c0)={@void, @val, @eth={@random="43629491d6c5", @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "1d2865", 0x14, 0x6, 0x0, @remote, @private0, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}}, 0x58) [ 1309.142251][ T3660] BPF:, 0 (anon) [ 1309.146128][ T3660] BPF:, 3 (invalid-name-offset) [ 1309.173669][ T3660] BPF:) [ 1309.201148][ T3670] BPF:[1] FUNC_PROTO (anon) [ 1309.212610][ T3660] BPF: [ 1309.220959][ T3670] BPF:return=1048575 args=( [ 1309.240532][ T3660] BPF:Invalid return type 06:51:47 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x20}]}) [ 1309.255051][ T3670] BPF:0 (anon) [ 1309.259703][ T3660] BPF: [ 1309.259703][ T3660] [ 1309.263902][ T3670] BPF:, vararg [ 1309.273185][ T3670] BPF:) [ 1309.282367][ T3670] BPF: 06:51:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001600)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001640)={@empty, 0x0, r1}) [ 1309.299648][ T3670] BPF:Invalid return type 06:51:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xe00, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1309.299659][ T3670] BPF: [ 1309.299659][ T3670] 06:51:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x1000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1309.303347][ T3680] BPF:[1] FUNC_PROTO (anon) [ 1309.303422][ T3680] BPF:return=3328 args=( [ 1309.303430][ T3680] BPF:0 (anon) [ 1309.303504][ T3680] BPF:, 0 (anon) [ 1309.303513][ T3680] BPF:, 3 (invalid-name-offset) [ 1309.303520][ T3680] BPF:) [ 1309.303526][ T3680] BPF: [ 1309.303531][ T3680] BPF:Invalid return type [ 1309.303536][ T3680] BPF: [ 1309.303536][ T3680] [ 1309.400226][ T3689] BPF:[1] FUNC_PROTO (anon) [ 1309.411005][ T3695] BPF:[1] FUNC_PROTO (anon) [ 1309.428150][ T3689] BPF:return=3584 args=( [ 1309.475691][ T3689] BPF:0 (anon) [ 1309.479225][ T3695] BPF:return=16777216 args=( [ 1309.485142][ T3695] BPF:0 (anon) [ 1309.485814][ T3689] BPF:, 0 (anon) [ 1309.491063][ T3695] BPF:, vararg [ 1309.495791][ T3695] BPF:) [ 1309.498947][ T3695] BPF: [ 1309.502093][ T3695] BPF:Invalid return type [ 1309.505096][ T3689] BPF:, 3 (invalid-name-offset) [ 1309.506868][ T3695] BPF: [ 1309.506868][ T3695] [ 1309.522549][ T3689] BPF:) [ 1309.528577][ T3689] BPF: [ 1309.533599][ T3689] BPF:Invalid return type [ 1309.533896][ T3707] BPF:[1] FUNC_PROTO (anon) [ 1309.545196][ T3707] BPF:return=16777216 args=( [ 1309.546112][ T3689] BPF: [ 1309.546112][ T3689] [ 1309.555570][ T3707] BPF:0 (anon) [ 1309.559818][ T3707] BPF:, vararg [ 1309.563511][ T3707] BPF:) [ 1309.566461][ T3707] BPF: [ 1309.569640][ T3707] BPF:Invalid return type [ 1309.574337][ T3709] BPF:[1] FUNC_PROTO (anon) [ 1309.579319][ T3709] BPF:return=3584 args=( [ 1309.583830][ T3707] BPF: [ 1309.583830][ T3707] [ 1309.590292][ T3709] BPF:0 (anon) [ 1309.599747][ T3709] BPF:, 0 (anon) [ 1309.607877][ T3709] BPF:, 3 (invalid-name-offset) [ 1309.620666][ T3709] BPF:) [ 1309.624107][ T3709] BPF: [ 1309.642944][ T3709] BPF:Invalid return type [ 1309.647525][ T3709] BPF: [ 1309.647525][ T3709] 06:51:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000d00)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 06:51:47 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000a00)='802.15.4 MAC\x00', 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_DISASSOCIATE_REQ(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={0x0}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 06:51:47 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}], 0x1c) 06:51:47 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x20}]}) 06:51:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x2000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x1100, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f00000000c0)=""/18) 06:51:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x34, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x34}}, 0x0) [ 1309.987426][ T3735] BPF:[1] FUNC_PROTO (anon) [ 1309.992904][ T3735] BPF:return=33554432 args=( [ 1310.010463][ T3740] BPF:[1] FUNC_PROTO (anon) [ 1310.018673][ T3735] BPF:0 (anon) [ 1310.023496][ T3740] BPF:return=4352 args=( [ 1310.029673][ T3740] BPF:0 (anon) 06:51:47 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x20}]}) [ 1310.038762][ T3735] BPF:, vararg [ 1310.049960][ T3735] BPF:) [ 1310.050648][ T3740] BPF:, 0 (anon) [ 1310.057387][ T3735] BPF: [ 1310.059682][ T3740] BPF:, 3 (invalid-name-offset) [ 1310.063879][ T3735] BPF:Invalid return type [ 1310.075475][ T3740] BPF:) [ 1310.083212][ T3735] BPF: [ 1310.083212][ T3735] 06:51:47 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_DISASSOCIATE_REQ(r0, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) [ 1310.091347][ T3740] BPF: [ 1310.100258][ T3740] BPF:Invalid return type [ 1310.114736][ T3740] BPF: [ 1310.114736][ T3740] [ 1310.120127][ T3751] BPF:[1] FUNC_PROTO (anon) 06:51:47 executing program 0: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001bc0)=[{&(0x7f00000009c0)="bc", 0x1}, {&(0x7f0000000ac0)="7ed2", 0x2, 0xffffffffffffff7f}]) [ 1310.145402][ T3751] BPF:return=33554432 args=( [ 1310.150516][ T9611] Bluetooth: hci0: command 0x0401 tx timeout [ 1310.151731][ T3752] BPF:[1] FUNC_PROTO (anon) [ 1310.168224][ T3751] BPF:0 (anon) [ 1310.181325][ T3751] BPF:, vararg [ 1310.190584][ T3752] BPF:return=4352 args=( [ 1310.191239][ T3751] BPF:) [ 1310.203336][ T3752] BPF:0 (anon) [ 1310.212093][ T3752] BPF:, 0 (anon) [ 1310.213196][ T3751] BPF: [ 1310.229094][ T3751] BPF:Invalid return type [ 1310.232901][ T3752] BPF:, 3 (invalid-name-offset) 06:51:48 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000001bc0)=[{0x0, 0x0, 0xffff}, {&(0x7f0000000bc0)="cd994c3c35ffbfe974cf05c9eaef1d1bf489ec2d9e588688f44bf3d915309b0da7c1e4546c12850a27482c2f06c879e8c57c57dab5ec874dc3ad3d7c8cba4343a026677cd555e24c89a7de55886a0157592af7c0cc41f7532af9bb2b1c20dc59ec74e7316029c18feada4044977abbb3d62c7de1b4549d140d8af43287f784f330eccd78b2a1e1f9dc581929c9aef78470369eab45572dc94f16e9fa0e3b47a337a8c1b11fbe9f7f28a9c4dcac152db677b898982ee3a2078b8564e6e78f02a557b3f425d8ef3fcf52797dbd3aa640572aa5275f0e3221b4828d866a1df2d268f81167905a33bba4341f775dd2643930b6decb705a564a7bb36cf382f20f61d84cd1b6b5daec4dedbca4e1adc2d1d7a65c3e41dd2470e6ba11bcac7aa10c9aa2ea193300eeb9bb12ade7813dc4d637201f1bc9987c8742c29af0371e8de67fb45a88a12bf1b00d6e7c7101104475ccefb1ebfd699472da9dffc5354c06f8aeaa1c7e434d0c1013cb4ef3ebb3952cfd4b3d6b46b3eac19938ab40dc0b6ad78e8af868252b2fd8ba6b97eefef1a03686d0e1e0c44a70b65e7ac342a0f527a857600f0fb3a276f3644e8a1a48b35fd784929ae62d5a8ffc20111390d10b9029f078129e2c2542064d28d70cedf29186c8f970c154b2298ea3c4a3de1dca2e6e58f93feb11", 0x1e3, 0x8}]) 06:51:48 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x20}]}) 06:51:48 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000180)) [ 1310.253150][ T3751] BPF: [ 1310.253150][ T3751] [ 1310.265418][ T3752] BPF:) [ 1310.275071][ T3752] BPF: [ 1310.286165][ T3752] BPF:Invalid return type [ 1310.303611][ T3752] BPF: [ 1310.303611][ T3752] 06:51:48 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}], 0x1c) 06:51:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x3000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000001c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:51:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x1200, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:48 executing program 5: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f00000000c0)=0xf4240) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000080)=0x1) 06:51:48 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @empty}, 0x0, 0x2, 0x3}, 0x20) [ 1310.834708][ T3807] BPF:[1] FUNC_PROTO (anon) [ 1310.842181][ T3810] BPF:[1] FUNC_PROTO (anon) [ 1310.845398][ T3807] BPF:return=4608 args=( [ 1310.858128][ T3807] BPF:0 (anon) [ 1310.866529][ T3807] BPF:, 0 (anon) [ 1310.867771][ T3810] BPF:return=50331648 args=( 06:51:48 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) [ 1310.885564][ T3807] BPF:, 3 (invalid-name-offset) [ 1310.897158][ T3810] BPF:0 (anon) [ 1310.900667][ T3807] BPF:) [ 1310.904157][ T3807] BPF: [ 1310.909327][ T3807] BPF:Invalid return type [ 1310.915063][ T3807] BPF: [ 1310.915063][ T3807] [ 1310.916006][ T3810] BPF:, vararg 06:51:48 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 06:51:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000440)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x4e22, 0x0, @loopback}}}, 0x90) [ 1310.934894][ T3810] BPF:) [ 1310.942120][ T3810] BPF: [ 1310.949878][ T3810] BPF:Invalid return type [ 1310.959677][ T3818] BPF:[1] FUNC_PROTO (anon) [ 1310.971245][ T3810] BPF: [ 1310.971245][ T3810] [ 1310.983473][ T3818] BPF:return=4608 args=( [ 1311.003680][ T3824] BPF:[1] FUNC_PROTO (anon) [ 1311.006772][ T3818] BPF:0 (anon) [ 1311.011600][ T3824] BPF:return=50331648 args=( [ 1311.028717][ T3818] BPF:, 0 (anon) [ 1311.030792][ T3824] BPF:0 (anon) 06:51:48 executing program 0: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00', 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)={0x14, r0, 0x1}, 0x14}}, 0x0) 06:51:48 executing program 1: syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) 06:51:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000ac0)={'batadv_slave_0\x00'}) [ 1311.038931][ T3824] BPF:, vararg [ 1311.051549][ T3824] BPF:) [ 1311.052202][ T3818] BPF:, 3 (invalid-name-offset) [ 1311.060031][ T3824] BPF: [ 1311.075079][ T3824] BPF:Invalid return type [ 1311.075578][ T3818] BPF:) [ 1311.088576][ T3824] BPF: [ 1311.088576][ T3824] [ 1311.088862][ T3818] BPF: [ 1311.109658][ T3818] BPF:Invalid return type [ 1311.129213][ T3818] BPF: [ 1311.129213][ T3818] 06:51:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}], 0x1c) 06:51:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x4000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:49 executing program 5: perf_event_open(&(0x7f0000c86f88)={0x2, 0xb8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:51:49 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x43}}], 0x10) 06:51:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@dev, @private0, @mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa80122}) 06:51:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x2000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:49 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000001340)) [ 1311.729400][ T3847] BPF:[1] FUNC_PROTO (anon) [ 1311.740108][ T3847] BPF:return=67108864 args=( [ 1311.756147][ T3847] BPF:0 (anon) [ 1311.775165][ T3847] BPF:, vararg 06:51:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x14, r1, 0x221}, 0x14}}, 0x0) [ 1311.784572][ T3852] BPF:[1] FUNC_PROTO (anon) [ 1311.793682][ T3847] BPF:) [ 1311.807925][ T3852] BPF:return=8192 args=( [ 1311.813044][ T3847] BPF: [ 1311.820471][ T3847] BPF:Invalid return type [ 1311.828492][ T3852] BPF:0 (anon) 06:51:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000180)=0x4) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@remote, @remote, @remote, 0x0, 0x0, 0x7, 0xd00, 0x4, 0x84a802a9}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/full\x00', 0x309403, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r1, 0x0, 0x0) recvmsg$can_bcm(r1, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/12, 0xc}], 0x1, &(0x7f0000000780)=""/4084, 0xff4}, 0x40000002) [ 1311.839215][ T3847] BPF: [ 1311.839215][ T3847] [ 1311.845026][ T3852] BPF:, 0 (anon) [ 1311.856819][ T3852] BPF:, 3 (invalid-name-offset) [ 1311.872128][ T3852] BPF:) [ 1311.872897][ T3860] BPF:[1] FUNC_PROTO (anon) 06:51:49 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEV(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={0x0}}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000780)='802.15.4 MAC\x00', r0) [ 1311.890189][ T3852] BPF: [ 1311.899722][ T3852] BPF:Invalid return type [ 1311.901971][ T3860] BPF:return=67108864 args=( [ 1311.915435][ T3852] BPF: [ 1311.915435][ T3852] [ 1311.925983][ T3860] BPF:0 (anon) [ 1311.935250][ T3860] BPF:, vararg 06:51:49 executing program 5: getitimer(0x1, &(0x7f0000000b00)) [ 1311.945190][ T3860] BPF:) [ 1311.952428][ T3864] BPF:[1] FUNC_PROTO (anon) [ 1311.958573][ T3860] BPF: [ 1311.965325][ T3860] BPF:Invalid return type [ 1311.972446][ T3864] BPF:return=8192 args=( [ 1311.982032][ T3860] BPF: [ 1311.982032][ T3860] [ 1311.992108][ T3864] BPF:0 (anon) [ 1312.006013][ T3864] BPF:, 0 (anon) [ 1312.022924][ T3864] BPF:, 3 (invalid-name-offset) 06:51:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$read(0xb, r1, &(0x7f0000000340)=""/198, 0xc6) [ 1312.046463][ T3864] BPF:) [ 1312.057632][ T3864] BPF: [ 1312.073630][ T3864] BPF:Invalid return type [ 1312.078689][ T3864] BPF: [ 1312.078689][ T3864] 06:51:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}], 0x1c) 06:51:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x5000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:50 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @dev}, @in6={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}], 0x8c) 06:51:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 06:51:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x2500, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:50 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="e8000000000000000b010000ff0700008e548fe282fcaec7bf495d5c618332756cbb1bb9ce6d12b9d976d1f33aca41e50a3342bcd67c311f7885a05c3fcf2ae21ffc97ec481e7ca2c3ca4c7b3bf94448f62e111e5a79929b9182cc977ba6ae76ece37bdaac6da997fbc15f0c79f42155b99a280667b51fb8750fc3be5ef41f953fedb32aceeada13250626957e2013d5b12cc916541ccbeb0d4060a4dd89664eaba2f6b4ede0c9e3dc1c9446d9284ebe0e46eee7bc145ff0a2779c025553298812978ea53a8c60f254f23344a80a0aac7b141787bad6b0ba891e6cc85f2f3158f0d200000000000070000000000000000701000040000000afbb30c2946e41ef3167d1f6ed47aa1f52bad114a89dbed741f74a23cd8d915e2dcc74a4932642b90f90a9d3956d5cadb642ac79fcb0aae3654482188263abd27e9d57cc28032453dc75f333e1f367ab38b7e7719805a454e79802d07ec60c00b0000000000000000100000001"], 0x208}, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x208}, 0x0) recvmmsg(r1, &(0x7f0000005840)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000004500)=""/112, 0x70}}], 0x1, 0x0, 0x0) [ 1312.673577][ T3889] BPF:[1] FUNC_PROTO (anon) [ 1312.681259][ T3890] BPF:[1] FUNC_PROTO (anon) [ 1312.694450][ T3890] BPF:return=83886080 args=( [ 1312.694769][ T3889] BPF:return=9472 args=( [ 1312.716587][ T3889] BPF:0 (anon) [ 1312.718104][ T3890] BPF:0 (anon) 06:51:50 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @local}}}, 0x90) 06:51:50 executing program 0: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) 06:51:50 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmsg$kcm(r0, &(0x7f0000002ec0)={0x0, 0x0, 0x0}, 0x0) [ 1312.731813][ T3890] BPF:, vararg [ 1312.731923][ T3889] BPF:, 0 (anon) [ 1312.745656][ T3890] BPF:) [ 1312.761544][ T3890] BPF: [ 1312.777521][ T3890] BPF:Invalid return type [ 1312.782091][ T3889] BPF:, 3 (invalid-name-offset) [ 1312.788731][ T3890] BPF: [ 1312.788731][ T3890] [ 1312.800484][ T3889] BPF:) [ 1312.811110][ T3889] BPF: [ 1312.812285][ T3902] BPF:[1] FUNC_PROTO (anon) [ 1312.820427][ T3889] BPF:Invalid return type 06:51:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) accept4$inet6(r0, 0x0, 0x0, 0x0) [ 1312.832933][ T3902] BPF:return=83886080 args=( [ 1312.847971][ T3902] BPF:0 (anon) [ 1312.851837][ T3889] BPF: [ 1312.851837][ T3889] [ 1312.876056][ T3902] BPF:, vararg 06:51:50 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@ipv4={[], [], @dev}, @dev, @remote}) 06:51:50 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001600)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001640)={@ipv4={[], [], @remote}, 0x0, r1}) [ 1312.884677][ T3902] BPF:) [ 1312.889358][ T3902] BPF: [ 1312.894340][ T3902] BPF:Invalid return type [ 1312.903393][ T3912] BPF:[1] FUNC_PROTO (anon) [ 1312.911790][ T3902] BPF: [ 1312.911790][ T3902] [ 1312.922516][ T3912] BPF:return=9472 args=( [ 1312.940925][ T3912] BPF:0 (anon) [ 1312.962984][ T3912] BPF:, 0 (anon) [ 1312.973837][ T3912] BPF:, 3 (invalid-name-offset) [ 1312.989465][ T3912] BPF:) [ 1312.995553][ T3912] BPF: [ 1313.002747][ T3912] BPF:Invalid return type [ 1313.008829][ T3912] BPF: [ 1313.008829][ T3912] 06:51:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x2600, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:51 executing program 1: syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x12003) 06:51:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x6000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:51 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_TMR_TIMEBASE(r0, 0xc0045401, 0x0) 06:51:51 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000200)='ceph\x00', 0x0, 0x0, 0x0, r0) 06:51:51 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x101400, 0x0) read$alg(r0, 0x0, 0x0) 06:51:51 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_DISASSOCIATE_REQ(0xffffffffffffffff, 0x0, 0x0) [ 1313.614889][ T3931] BPF:[1] FUNC_PROTO (anon) [ 1313.629240][ T3931] BPF:return=9728 args=( [ 1313.652581][ T3931] BPF:0 (anon) 06:51:51 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}], 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) [ 1313.660654][ T3934] BPF:[1] FUNC_PROTO (anon) [ 1313.671680][ T3931] BPF:, 0 (anon) [ 1313.686323][ T3934] BPF:return=100663296 args=( [ 1313.692218][ T3931] BPF:, 3 (invalid-name-offset) [ 1313.709396][ T3934] BPF:0 (anon) 06:51:51 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"9aa43c24a3aedd7c133069fe083f6c30"}}}}, 0x90) 06:51:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002b00)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 06:51:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000001a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4090) [ 1313.713920][ T3931] BPF:) [ 1313.719484][ T3931] BPF: [ 1313.723134][ T3934] BPF:, vararg [ 1313.730943][ T3931] BPF:Invalid return type [ 1313.737068][ T3934] BPF:) [ 1313.743218][ T3934] BPF: [ 1313.748889][ T3931] BPF: [ 1313.748889][ T3931] [ 1313.756419][ T3934] BPF:Invalid return type [ 1313.782851][ T3934] BPF: [ 1313.782851][ T3934] [ 1313.792359][ T3946] BPF:[1] FUNC_PROTO (anon) [ 1313.804473][ T3946] BPF:return=9728 args=( [ 1313.815395][ T3949] BPF:[1] FUNC_PROTO (anon) [ 1313.817748][ T3946] BPF:0 (anon) 06:51:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}]}]}, 0x20}}, 0x0) [ 1313.834021][ T3946] BPF:, 0 (anon) [ 1313.839492][ T3949] BPF:return=100663296 args=( [ 1313.845280][ T3946] BPF:, 3 (invalid-name-offset) [ 1313.859604][ T3949] BPF:0 (anon) [ 1313.873862][ T3946] BPF:) [ 1313.878775][ T3949] BPF:, vararg 06:51:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x3f00, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:51 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) [ 1313.881599][ T3946] BPF: [ 1313.891520][ T3946] BPF:Invalid return type [ 1313.896716][ T3949] BPF:) [ 1313.899637][ T3946] BPF: [ 1313.899637][ T3946] [ 1313.903259][ T3949] BPF: [ 1313.913430][ T3949] BPF:Invalid return type [ 1313.926131][ T3949] BPF: [ 1313.926131][ T3949] 06:51:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x7000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:51 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x3, &(0x7f0000000000)=0x10003, 0x4) 06:51:51 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) 06:51:51 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f00000000c0)) [ 1314.017943][ T3965] BPF:[1] FUNC_PROTO (anon) [ 1314.022855][ T3965] BPF:return=16128 args=( [ 1314.050865][ T3965] BPF:0 (anon) [ 1314.059577][ T3965] BPF:, 0 (anon) 06:51:51 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$IOCTL_STATUS_ACCEL_DEV(r0, 0x40046103, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "24ff510d480307c7a83ef4b3e917ac650639a7ae0b06dc6c5630b53bd642f6a8"}) [ 1314.070577][ T3965] BPF:, 3 (invalid-name-offset) [ 1314.075593][ T3965] BPF:) [ 1314.082595][ T3979] BPF:[1] FUNC_PROTO (anon) [ 1314.090161][ T3965] BPF: [ 1314.097448][ T3965] BPF:Invalid return type [ 1314.103094][ T3979] BPF:return=117440512 args=( [ 1314.122446][ T3979] BPF:0 (anon) [ 1314.128942][ T3965] BPF: [ 1314.128942][ T3965] [ 1314.132219][ T3979] BPF:, vararg [ 1314.141715][ T3979] BPF:) [ 1314.144755][ T3979] BPF: [ 1314.149959][ T3979] BPF:Invalid return type [ 1314.154479][ T3979] BPF: [ 1314.154479][ T3979] [ 1314.165374][ T3991] BPF:[1] FUNC_PROTO (anon) [ 1314.170540][ T3991] BPF:return=117440512 args=( [ 1314.175716][ T3991] BPF:0 (anon) [ 1314.177924][ T3990] BPF:[1] FUNC_PROTO (anon) [ 1314.179445][ T3991] BPF:, vararg [ 1314.187661][ T3991] BPF:) [ 1314.190767][ T3991] BPF: [ 1314.193817][ T3991] BPF:Invalid return type [ 1314.198781][ T3991] BPF: [ 1314.198781][ T3991] [ 1314.200578][ T3990] BPF:return=16128 args=( [ 1314.225616][ T3990] BPF:0 (anon) [ 1314.236271][ T3990] BPF:, 0 (anon) [ 1314.243791][ T3990] BPF:, 3 (invalid-name-offset) [ 1314.258338][ T3990] BPF:) [ 1314.261335][ T3990] BPF: [ 1314.264223][ T3990] BPF:Invalid return type [ 1314.270152][ T3990] BPF: [ 1314.270152][ T3990] 06:51:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}]}, 0x20}}, 0x0) 06:51:52 executing program 3: keyctl$dh_compute(0x17, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={'xcbc-aes-neon\x00'}, &(0x7f0000000280)}) shmctl$IPC_STAT(0xffffffffffffffff, 0x2, 0x0) 06:51:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x14, r1, 0x1}, 0x14}}, 0x0) 06:51:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x8000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000003000ffff000000000000000000000000580001005400010008000100696665002c0002800c00060007000500000000001c0001"], 0x6c}}, 0x0) 06:51:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x4300, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:52 executing program 0: openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x400600, 0x0) 06:51:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) [ 1314.671219][ T4013] BPF:[1] FUNC_PROTO (anon) [ 1314.680127][ T4014] BPF:[1] FUNC_PROTO (anon) [ 1314.685075][ T4013] BPF:return=17152 args=( [ 1314.690376][ T4018] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1314.701455][ T4013] BPF:0 (anon) [ 1314.705186][ T4014] BPF:return=134217728 args=( [ 1314.715850][ T4013] BPF:, 0 (anon) [ 1314.720368][ T4014] BPF:0 (anon) [ 1314.726420][ T4013] BPF:, 3 (invalid-name-offset) [ 1314.733239][ T4014] BPF:, vararg [ 1314.735656][ T4018] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1314.748740][ T4013] BPF:) [ 1314.751985][ T4014] BPF:) [ 1314.765718][ T4014] BPF: 06:51:52 executing program 0: sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) 06:51:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000003000ffff000000000000000000000000580001005400010008000100696665002c0002800c00060007000500000000001c0001"], 0x6c}}, 0x0) [ 1314.769922][ T4013] BPF: [ 1314.780715][ T4019] could not allocate digest TFM handle xcbc-aes-neon [ 1314.781870][ T4013] BPF:Invalid return type [ 1314.792967][ T4014] BPF:Invalid return type [ 1314.821473][ T4014] BPF: [ 1314.821473][ T4014] [ 1314.831861][ T4013] BPF: [ 1314.831861][ T4013] [ 1314.842976][ T4019] could not allocate digest TFM handle xcbc-aes-neon [ 1314.856007][ T4040] BPF:[1] FUNC_PROTO (anon) 06:51:52 executing program 1: r0 = socket(0x25, 0x80001, 0x0) bind$802154_dgram(r0, 0x0, 0x0) 06:51:52 executing program 0: syz_read_part_table(0x6, 0x3, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x401}, {&(0x7f0000000540)}]) syz_read_part_table(0x7fff, 0x4, &(0x7f0000001bc0)=[{&(0x7f00000009c0)="bc87dc6f390e6c150abfd1739a9b633c95d1767133b11625adb29d502b968cc1c26b0d192855ad1240", 0x29, 0x4}, {&(0x7f0000000a00)}, {&(0x7f0000000ac0)="7ed2cbb9606f761b5602ca264013ce4592f9ad4e2365ce82e174fc6eaf8e4cedb0d77cf703bc99ca6547dbfedea8688b9e7c04caae0d21c1ca31c964c8494bf7ae8498dddd627193682746b47cdb4b5c27748caad76986d080678dab9e39f7cb6aa0be03b6b385d38ba34d7134b2b8e7c06b2337a7a6a5ee1e2ff2ec794a73674f380d", 0x83, 0xffffffffffffff7f}, {&(0x7f0000000bc0)="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", 0x441, 0x8}]) [ 1314.868696][ T4041] BPF:[1] FUNC_PROTO (anon) [ 1314.878597][ T4040] BPF:return=134217728 args=( [ 1314.887527][ T4040] BPF:0 (anon) [ 1314.898054][ T4041] BPF:return=17152 args=( [ 1314.905202][ T4040] BPF:, vararg [ 1314.911630][ T4041] BPF:0 (anon) 06:51:52 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000001bc0)=[{0x0, 0x0, 0xffff}]) 06:51:52 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2}}) [ 1314.915578][ T4044] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1314.926388][ T4040] BPF:) [ 1314.932697][ T4040] BPF: [ 1314.939675][ T4041] BPF:, 0 (anon) [ 1314.940478][ T4040] BPF:Invalid return type [ 1314.949416][ T4044] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1314.954719][ T4041] BPF:, 3 (invalid-name-offset) [ 1314.962888][ T4040] BPF: [ 1314.962888][ T4040] 06:51:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x9000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000003000ffff000000000000000000000000580001005400010008000100696665002c0002800c00060007000500000000001c0001"], 0x6c}}, 0x0) 06:51:52 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003e80)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote, 0x100}, 0x1c, 0x0, 0x0, &(0x7f0000001400)=[@dontfrag={{0x14}}, @dstopts_2292={{0x18}}, @hoplimit_2292={{0x14}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xef7}}], 0x60}}], 0x1, 0x0) [ 1315.038159][ T4041] BPF:) [ 1315.046989][ T4054] loop3: detected capacity change from 0 to 255 [ 1315.060651][ T4041] BPF: [ 1315.078877][ T4041] BPF:Invalid return type 06:51:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x4800, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:52 executing program 1: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='F', 0x1, 0xfffffffffffffffd) [ 1315.099191][ T4067] BPF:[1] FUNC_PROTO (anon) [ 1315.100278][ T4041] BPF: [ 1315.100278][ T4041] [ 1315.120533][ T4067] BPF:return=150994944 args=( [ 1315.125254][ T4067] BPF:0 (anon) [ 1315.129657][ T4067] BPF:, vararg [ 1315.133258][ T4067] BPF:) [ 1315.141554][ T4067] BPF: 06:51:52 executing program 0: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f00000003c0)='logon\x00', &(0x7f0000000400)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000440)={0x0, "3ac0b17b53aa8dadad0155f369b48135927c9d0f1a628f06bd9a66e5d910b0cb2101b988b4fe469f68100d42c1c40cff58a0e9064e027b3793b9f069a88f4276"}, 0x48, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000004c0)='id_legacy\x00', &(0x7f0000000500)=@secondary='builtin_and_secondary_trusted\x00') [ 1315.148638][ T4054] loop3: detected capacity change from 0 to 255 [ 1315.155224][ T4070] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1315.165615][ T4067] BPF:Invalid return type [ 1315.168524][ T4070] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1315.188782][ T4067] BPF: [ 1315.188782][ T4067] 06:51:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="6c0000003000ffff000000000000000000000000580001005400010008000100696665002c0002800c00060007000500000000001c0001"], 0x6c}}, 0x0) [ 1315.202288][ T4083] BPF:[1] FUNC_PROTO (anon) 06:51:53 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000580), 0x10000005c) 06:51:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="410300bdf8ff000000000a"], 0x20}}, 0x0) [ 1315.227283][ T4083] BPF:return=150994944 args=( [ 1315.232313][ T4083] BPF:0 (anon) [ 1315.236036][ T4083] BPF:, vararg [ 1315.239906][ T4083] BPF:) [ 1315.243068][ T4083] BPF: [ 1315.246121][ T4083] BPF:Invalid return type [ 1315.250719][ T4083] BPF: [ 1315.250719][ T4083] [ 1315.264928][ T4085] BPF:[1] FUNC_PROTO (anon) 06:51:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xa000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:53 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) clone(0x2f802980, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)={0x0, 0x0, "f415f4"}) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000000)={0x0, "4f831e23152cc4b5f25aa37fb4f8f61622b941db24eb538718025de73e46f2ba"}) [ 1315.281685][ T4085] BPF:return=18432 args=( [ 1315.284832][ T4089] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1315.286257][ T4085] BPF:0 (anon) [ 1315.299169][ T4085] BPF:, 0 (anon) [ 1315.303167][ T4085] BPF:, 3 (invalid-name-offset) [ 1315.310491][ T4085] BPF:) [ 1315.313414][ T4085] BPF: [ 1315.316338][ T4085] BPF:Invalid return type [ 1315.320894][ T4085] BPF: [ 1315.320894][ T4085] [ 1315.332885][ T4089] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1315.369522][ T4085] BPF:[1] FUNC_PROTO (anon) 06:51:53 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}], 0x1c) getsockname$inet6(r0, 0x0, &(0x7f0000000040)) 06:51:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1007}], 0x1c) [ 1315.382185][ T4085] BPF:return=18432 args=( [ 1315.401337][ T4085] BPF:0 (anon) [ 1315.416902][ T4101] BPF:[1] FUNC_PROTO (anon) [ 1315.431250][ T4085] BPF:, 0 (anon) [ 1315.466475][ T4085] BPF:, 3 (invalid-name-offset) [ 1315.471690][ T4101] BPF:return=167772160 args=( [ 1315.476460][ T4101] BPF:0 (anon) [ 1315.480772][ T4101] BPF:, vararg [ 1315.484351][ T4101] BPF:) [ 1315.487282][ T4101] BPF: [ 1315.490140][ T4101] BPF:Invalid return type [ 1315.494664][ T4101] BPF: [ 1315.494664][ T4101] [ 1315.499715][ T4085] BPF:) [ 1315.502669][ T4085] BPF: [ 1315.505563][ T4085] BPF:Invalid return type [ 1315.510318][ T4085] BPF: [ 1315.510318][ T4085] 06:51:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x4c00, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1315.511298][ T4118] BPF:[1] FUNC_PROTO (anon) 06:51:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, 0x0) [ 1315.570593][ T4118] BPF:return=167772160 args=( [ 1315.602103][ T4118] BPF:0 (anon) 06:51:53 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000180)) 06:51:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000d00)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r1, 0x21, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) [ 1315.626048][ T4118] BPF:, vararg [ 1315.643597][ T4118] BPF:) [ 1315.659909][ T4126] BPF:[1] FUNC_PROTO (anon) [ 1315.660779][ T4118] BPF: [ 1315.674852][ T4126] BPF:return=19456 args=( [ 1315.681376][ T4118] BPF:Invalid return type [ 1315.689500][ T4126] BPF:0 (anon) [ 1315.698433][ T4118] BPF: [ 1315.698433][ T4118] [ 1315.702529][ T4126] BPF:, 0 (anon) [ 1315.714966][ T4126] BPF:, 3 (invalid-name-offset) 06:51:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xb000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000d00)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r1, 0x21, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) [ 1315.736775][ T4126] BPF:) [ 1315.751459][ T4126] BPF: [ 1315.771949][ T4126] BPF:Invalid return type [ 1315.794008][ T4126] BPF: [ 1315.794008][ T4126] [ 1315.820666][ T4144] BPF:[1] FUNC_PROTO (anon) [ 1315.825584][ T4146] BPF:[1] FUNC_PROTO (anon) [ 1315.834053][ T4144] BPF:return=184549376 args=( [ 1315.841197][ T4146] BPF:return=19456 args=( [ 1315.848070][ T4144] BPF:0 (anon) [ 1315.853805][ T4146] BPF:0 (anon) [ 1315.859540][ T4144] BPF:, vararg [ 1315.864150][ T4146] BPF:, 0 (anon) [ 1315.870284][ T4144] BPF:) [ 1315.876812][ T4146] BPF:, 3 (invalid-name-offset) [ 1315.882885][ T4144] BPF: [ 1315.889326][ T4144] BPF:Invalid return type [ 1315.895033][ T4146] BPF:) [ 1315.907210][ T4146] BPF: [ 1315.909999][ T4146] BPF:Invalid return type [ 1315.914325][ T4146] BPF: [ 1315.914325][ T4146] [ 1315.920017][ T4144] BPF: [ 1315.920017][ T4144] [ 1315.944744][ T4152] BPF:[1] FUNC_PROTO (anon) [ 1315.963366][ T4152] BPF:return=184549376 args=( [ 1315.975186][ T4152] BPF:0 (anon) [ 1315.984742][ T4152] BPF:, vararg [ 1315.993634][ T4152] BPF:) [ 1316.003125][ T4152] BPF: [ 1316.010889][ T4152] BPF:Invalid return type [ 1316.020727][ T4152] BPF: [ 1316.020727][ T4152] 06:51:53 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000580), 0x10000005c) 06:51:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000d00)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x24, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x24}}, 0x0) 06:51:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000d00)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r1, 0x21, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 06:51:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x6000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1316.137304][ T4091] ceph: No mds server is up or the cluster is laggy [ 1316.219456][ T4170] BPF:[1] FUNC_PROTO (anon) [ 1316.230916][ T4170] BPF:return=24576 args=( [ 1316.241309][ T4170] BPF:0 (anon) [ 1316.251194][ T4170] BPF:, 0 (anon) [ 1316.258248][ T4170] BPF:, 3 (invalid-name-offset) [ 1316.263348][ T4170] BPF:) [ 1316.266326][ T4170] BPF: [ 1316.271210][ T4170] BPF:Invalid return type [ 1316.275713][ T4170] BPF: [ 1316.275713][ T4170] [ 1316.296609][ T4176] BPF:[1] FUNC_PROTO (anon) [ 1316.301742][ T4176] BPF:return=24576 args=( [ 1316.306349][ T4176] BPF:0 (anon) [ 1316.326597][ T4176] BPF:, 0 (anon) [ 1316.330318][ T4176] BPF:, 3 (invalid-name-offset) [ 1316.356652][ T4176] BPF:) [ 1316.359755][ T4176] BPF: [ 1316.362572][ T4176] BPF:Invalid return type [ 1316.384145][ T4176] BPF: [ 1316.384145][ T4176] 06:51:54 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x7fff, 0x5, &(0x7f0000001bc0)=[{&(0x7f00000009c0)="bc87dc6f390e6c150abfd1739a9b633c95d1767133b11625adb29d502b968cc1c26b0d192855ad12407fc5ead420213390", 0x31, 0x4}, {&(0x7f0000000a00)="fcba4a99401cda392ab9616e5a6d0469795071a890e73ae7fb2747dc75d722ab85cf25a913c01a628c25f3354aeac00785117308b4281b2f3c8fc9eff15ddfb73a", 0x41, 0x8}, {&(0x7f0000000a80)="e62fad53d2c8e912ac6e4ad601179d85bbb23b8d6db16f43a9c42519554b44d1d4", 0x21, 0xffff}, {&(0x7f0000000ac0)="7ed2cbb9606f761b5602ca264013ce4592f9ad4e2365ce82e174fc6eaf8e4cedb0d77cf703bc99ca6547dbfedea8688b9e7c04caae0d21c1ca31c964c8494bf7ae8498dddd627193682746b47cdb4b5c27748caad76986d080678dab9e39f7cb6aa0be03b6b385d38ba34d7134b2b8e7c06b2337a7a6a5ee1e2ff2ec794a73674f380df6d3686b2bb7759685cbf3a177712a5ff09f3b8247ad0ea75509158f5ebb60f50e13ca9c0e842b3a2b4d6bd4b4c573cfe41eb01715376cdcadba46741665c3a7f9e2c9125e357db726f03718e19c3a3417eb9b071b441b7320dc", 0xdd, 0xffffffffffffff7f}, {&(0x7f0000000bc0), 0x0, 0x8}]) 06:51:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xc000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000d00)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r1, 0x21, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 06:51:54 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDCTL_FM_4OP_ENABLE(r0, 0x4004510f, &(0x7f0000000040)=0xffffffff) 06:51:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x6800, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[], 0x14}}, 0x0) [ 1316.634301][ T4200] BPF:[1] FUNC_PROTO (anon) [ 1316.647690][ T4203] BPF:[1] FUNC_PROTO (anon) [ 1316.665524][ T4200] BPF:return=26624 args=( [ 1316.669170][ T4203] BPF:return=201326592 args=( 06:51:54 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, &(0x7f0000000540)="872aa7653d79b32a26040c0aa08fcb53d6a58301cdcb6f728fc9ccfcfb66b1790a7ff5747f3e1b169b523b2d9f7be7aa0d5e13295200107c81d75e335b6cafc5bebda5c8a8966e8b76ffae24c15cc127753242bd370b8fe6aa898abdd8cebef0f675d0"}}, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xd}, 0x0, 0xb5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15, 0x2}, &(0x7f0000000400)) creat(&(0x7f0000000440)='./file0\x00', 0x123) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000580), 0x10000005c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) 06:51:54 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x2, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "35719bda"}, 0x0, 0x0, @userptr}) [ 1316.688068][ T4200] BPF:0 (anon) [ 1316.705621][ T4203] BPF:0 (anon) [ 1316.717436][ T4203] BPF:, vararg [ 1316.723687][ T4200] BPF:, 0 (anon) [ 1316.730267][ T4203] BPF:) [ 1316.741529][ T4203] BPF: [ 1316.744296][ T4200] BPF:, 3 (invalid-name-offset) [ 1316.751265][ T4203] BPF:Invalid return type [ 1316.767303][ T4203] BPF: [ 1316.767303][ T4203] [ 1316.779313][ T4200] BPF:) [ 1316.792835][ T4200] BPF: [ 1316.800679][ T4215] BPF:[1] FUNC_PROTO (anon) [ 1316.803705][ T4200] BPF:Invalid return type [ 1316.811176][ T4200] BPF: [ 1316.811176][ T4200] [ 1316.817853][ T4215] BPF:return=201326592 args=( [ 1316.822557][ T4215] BPF:0 (anon) [ 1316.826120][ T4215] BPF:, vararg [ 1316.829554][ T8980] libceph: connect (1)[d::]:6789 error -22 [ 1316.829799][ T4215] BPF:) [ 1316.837075][ T4218] BPF:[1] FUNC_PROTO (anon) [ 1316.838176][ T4215] BPF: [ 1316.842734][ T4218] BPF:return=26624 args=( [ 1316.845614][ T4215] BPF:Invalid return type [ 1316.854341][ T4215] BPF: [ 1316.854341][ T4215] [ 1316.863715][ T8980] libceph: mon0 (1)[d::]:6789 connect error [ 1316.911945][ T4218] BPF:0 (anon) [ 1316.915486][ T4218] BPF:, 0 (anon) [ 1316.919181][ T4218] BPF:, 3 (invalid-name-offset) [ 1316.924842][ T4218] BPF:) [ 1316.925141][ T8980] libceph: connect (1)[d::]:6789 error -22 [ 1316.927650][ T4218] BPF: [ 1316.927657][ T4218] BPF:Invalid return type [ 1316.927663][ T4218] BPF: [ 1316.927663][ T4218] 06:51:54 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000580), 0x10000005c) 06:51:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) 06:51:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xd000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x6c00, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:54 executing program 5: r0 = getpid() ptrace(0x8, r0) [ 1317.023728][ T8980] libceph: mon0 (1)[d::]:6789 connect error [ 1317.036516][ T4175] ceph: No mds server is up or the cluster is laggy [ 1317.137514][ T4233] BPF:[1] FUNC_PROTO (anon) [ 1317.140778][ T4234] BPF:[1] FUNC_PROTO (anon) [ 1317.142152][ T4233] BPF:return=218103808 args=( [ 1317.142162][ T4233] BPF:0 (anon) [ 1317.142168][ T4233] BPF:, vararg [ 1317.142173][ T4233] BPF:) [ 1317.142178][ T4233] BPF: [ 1317.167189][ T4234] BPF:return=27648 args=( 06:51:55 executing program 5: add_key$user(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000080)='F', 0x1, 0xfffffffffffffffd) 06:51:55 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003e80)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000001400)=[@dstopts_2292={{0x18}}, @hoplimit_2292={{0x14}}], 0x30}}], 0x1, 0x0) [ 1317.187173][ T4234] BPF:0 (anon) [ 1317.210022][ T4233] BPF:Invalid return type [ 1317.220029][ T4234] BPF:, 0 (anon) [ 1317.224850][ T4233] BPF: [ 1317.224850][ T4233] [ 1317.233447][ T4234] BPF:, 3 (invalid-name-offset) [ 1317.252109][ T4234] BPF:) [ 1317.255389][ T4239] BPF:[1] FUNC_PROTO (anon) [ 1317.267098][ T4234] BPF: [ 1317.272190][ T4239] BPF:return=218103808 args=( [ 1317.280583][ T4234] BPF:Invalid return type [ 1317.295467][ T4239] BPF:0 (anon) [ 1317.301480][ T4234] BPF: [ 1317.301480][ T4234] 06:51:55 executing program 5: syz_read_part_table(0x0, 0x5, &(0x7f0000001bc0)=[{&(0x7f00000009c0)="bc87dc6f390e6c150abfd1739a9b633c95d1767133b11625adb29d502b968cc1c26b", 0x22}, {&(0x7f0000000a00), 0x0, 0x8}, {0x0, 0x0, 0xffff}, {&(0x7f0000000ac0)="7ed2cbb9606f761b5602ca264013ce4592f9ad4e2365ce82e174fc6eaf8e4cedb0d77cf703bc99ca6547dbfedea8688b9e7c04caae0d21c1ca31c964c8494bf7ae8498dddd627193682746b47cdb4b5c27748caad76986d080678dab9e39f7cb6aa0be03b6b385d38ba34d7134b2b8e7c06b2337a7a6a5ee1e2ff2ec794a73674f380df6d3686b2bb7759685cbf3a1", 0x8f, 0xffffffffffffff7f}, {&(0x7f0000000bc0)="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", 0xbfe, 0x8}]) 06:51:55 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000c00)='802.15.4 MAC\x00', r0) [ 1317.314421][ T4239] BPF:, vararg [ 1317.322549][ T8980] libceph: connect (1)[d::]:6789 error -22 [ 1317.328297][ T4239] BPF:) [ 1317.334216][ T8980] libceph: mon0 (1)[d::]:6789 connect error [ 1317.338220][ T4243] BPF:[1] FUNC_PROTO (anon) [ 1317.345456][ T4239] BPF: [ 1317.350821][ T4243] BPF:return=27648 args=( [ 1317.358500][ T4239] BPF:Invalid return type [ 1317.368646][ T4243] BPF:0 (anon) [ 1317.390562][ T4239] BPF: [ 1317.390562][ T4239] [ 1317.406017][ T4243] BPF:, 0 (anon) [ 1317.426683][ T8980] Bluetooth: hci0: command 0x0401 tx timeout [ 1317.429669][ T4243] BPF:, 3 (invalid-name-offset) 06:51:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xe000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1317.471536][ T4251] loop5: detected capacity change from 0 to 16383 [ 1317.503676][ T4243] BPF:) [ 1317.514176][ T4208] ceph: No mds server is up or the cluster is laggy 06:51:55 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, &(0x7f0000000540)="872aa7653d79b32a26040c0aa08fcb53d6a58301cdcb6f728fc9ccfcfb66b1790a7ff5747f3e1b169b523b2d9f7be7aa0d5e13295200107c81d75e335b6cafc5bebda5c8a8966e8b76ffae24c15cc127753242bd370b8fe6aa898abdd8cebef0f675d0"}}, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xd}, 0x0, 0xb5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15, 0x2}, &(0x7f0000000400)) creat(&(0x7f0000000440)='./file0\x00', 0x123) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000580), 0x10000005c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) [ 1317.529455][ T4243] BPF: 06:51:55 executing program 1: ustat(0x1, 0x0) [ 1317.554822][ T4243] BPF:Invalid return type [ 1317.566154][ T4263] BPF:[1] FUNC_PROTO (anon) [ 1317.571184][ T4263] BPF:return=234881024 args=( [ 1317.576021][ T4263] BPF:0 (anon) [ 1317.592516][ T4263] BPF:, vararg [ 1317.598601][ T4251] loop5: detected capacity change from 0 to 16383 [ 1317.601452][ T4243] BPF: [ 1317.601452][ T4243] [ 1317.609878][ T4263] BPF:) [ 1317.619633][ T4263] BPF: [ 1317.629435][ T4263] BPF:Invalid return type [ 1317.642762][ T4263] BPF: [ 1317.642762][ T4263] [ 1317.667705][ T4270] BPF:[1] FUNC_PROTO (anon) [ 1317.672320][ T4270] BPF:return=234881024 args=( [ 1317.677059][ T4270] BPF:0 (anon) [ 1317.680692][ T4270] BPF:, vararg [ 1317.685033][ T4270] BPF:) [ 1317.687877][ T4270] BPF: [ 1317.690637][ T4270] BPF:Invalid return type [ 1317.694953][ T4270] BPF: [ 1317.694953][ T4270] [ 1317.758459][ T9705] libceph: connect (1)[d::]:6789 error -22 [ 1317.764332][ T9705] libceph: mon0 (1)[d::]:6789 connect error [ 1318.021502][ T4274] ceph: No mds server is up or the cluster is laggy 06:51:55 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000580), 0x10000005c) 06:51:55 executing program 1: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 06:51:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xf000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:55 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003e80)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x0) 06:51:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x7400, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:55 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, &(0x7f0000000540)="872aa7653d79b32a26040c0aa08fcb53d6a58301cdcb6f728fc9ccfcfb66b1790a7ff5747f3e1b169b523b2d9f7be7aa0d5e13295200107c81d75e335b6cafc5bebda5c8a8966e8b76ffae24c15cc127753242bd370b8fe6aa898abdd8cebef0f675d0"}}, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xd}, 0x0, 0xb5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15, 0x2}, &(0x7f0000000400)) creat(&(0x7f0000000440)='./file0\x00', 0x123) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000580), 0x10000005c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) [ 1318.129382][ T4244] ceph: No mds server is up or the cluster is laggy 06:51:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000006100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4004010) 06:51:56 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00', r0) [ 1318.228497][ T4305] BPF:[1] FUNC_PROTO (anon) [ 1318.237547][ T4306] BPF:[1] FUNC_PROTO (anon) [ 1318.254793][ T4305] BPF:return=29696 args=( [ 1318.255848][ T4306] BPF:return=251658240 args=( [ 1318.264281][ T9706] libceph: connect (1)[d::]:6789 error -22 [ 1318.273473][ T4306] BPF:0 (anon) [ 1318.277642][ T4306] BPF:, vararg [ 1318.281440][ T4306] BPF:) [ 1318.284330][ T4306] BPF: [ 1318.287969][ T4306] BPF:Invalid return type [ 1318.289515][ T9706] libceph: mon0 (1)[d::]:6789 connect error [ 1318.292487][ T4306] BPF: [ 1318.292487][ T4306] [ 1318.304301][ T4305] BPF:0 (anon) [ 1318.310956][ T4305] BPF:, 0 (anon) [ 1318.314783][ T4305] BPF:, 3 (invalid-name-offset) [ 1318.320498][ T4305] BPF:) [ 1318.323442][ T4305] BPF: [ 1318.326329][ T4305] BPF:Invalid return type [ 1318.332049][ T4305] BPF: [ 1318.332049][ T4305] [ 1318.333802][ T4318] BPF:[1] FUNC_PROTO (anon) [ 1318.348734][ T4321] BPF:[1] FUNC_PROTO (anon) [ 1318.365837][ T4318] BPF:return=251658240 args=( [ 1318.391016][ T4321] BPF:return=29696 args=( [ 1318.406843][ T4318] BPF:0 (anon) [ 1318.427304][ T4321] BPF:0 (anon) [ 1318.435527][ T4318] BPF:, vararg 06:51:56 executing program 5: getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) socket$nl_generic(0x10, 0x3, 0x10) shmctl$IPC_RMID(0x0, 0x0) 06:51:56 executing program 1: socket(0x18, 0x0, 0x6) [ 1318.456510][ T4321] BPF:, 0 (anon) [ 1318.467871][ T4318] BPF:) [ 1318.489904][ T4321] BPF:, 3 (invalid-name-offset) [ 1318.510405][ T4318] BPF: [ 1318.514513][ T4318] BPF:Invalid return type [ 1318.525216][ T4321] BPF:) [ 1318.533533][ T4318] BPF: [ 1318.533533][ T4318] [ 1318.541500][ T4321] BPF: [ 1318.558394][ T4321] BPF:Invalid return type 06:51:56 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000700)={@private1, @ipv4={[], [], @empty}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x2, 0x0, 0x500, 0x0, 0x220}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000580)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000005c0)={@remote, 0x59, r2}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/full\x00', 0x309403, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r3, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x401, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r4, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x3, 0x9, 0x0, 0x40, r3, 0x4, [], 0x0, r4, 0x0, 0x3, 0x3}, 0x40) [ 1318.594068][ T4321] BPF: [ 1318.594068][ T4321] 06:51:56 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000140)={0x1f, @fixed={[], 0x11}}, 0x8) connect$bt_sco(r0, &(0x7f0000000040)={0x1f, @none}, 0x8) [ 1318.638211][ T9705] libceph: connect (1)[d::]:6789 error -22 [ 1318.644185][ T9705] libceph: mon0 (1)[d::]:6789 connect error [ 1318.965379][ T4303] ceph: No mds server is up or the cluster is laggy 06:51:56 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, &(0x7f0000000540)="872aa7653d79b32a26040c0aa08fcb53d6a58301cdcb6f728fc9ccfcfb66b1790a7ff5747f3e1b169b523b2d9f7be7aa0d5e13295200107c81d75e335b6cafc5bebda5c8a8966e8b76ffae24c15cc127753242bd370b8fe6aa898abdd8cebef0f675d0"}}, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xd}, 0x0, 0xb5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15, 0x2}, &(0x7f0000000400)) creat(&(0x7f0000000440)='./file0\x00', 0x123) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000580), 0x10000005c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) 06:51:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x10000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x7a00, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:56 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000340)={0x0, 0x0}) 06:51:56 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002b00)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @loopback, 0x7}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000080)="e1", 0x1}], 0x1}}], 0x1, 0x4000010) [ 1319.045103][ T4335] ceph: No mds server is up or the cluster is laggy [ 1319.103431][ T4365] BPF:[1] FUNC_PROTO (anon) [ 1319.113523][ T4365] BPF:return=268435456 args=( [ 1319.135803][ T4365] BPF:0 (anon) [ 1319.141941][ T4365] BPF:, vararg [ 1319.145633][ T4367] BPF:[1] FUNC_PROTO (anon) [ 1319.145681][ T4365] BPF:) [ 1319.154131][ T4365] BPF: [ 1319.158006][ T4367] BPF:return=31232 args=( [ 1319.163054][ T4365] BPF:Invalid return type [ 1319.171240][ T4365] BPF: [ 1319.171240][ T4365] [ 1319.179269][ T4367] BPF:0 (anon) [ 1319.183030][ T4367] BPF:, 0 (anon) [ 1319.189746][ T4367] BPF:, 3 (invalid-name-offset) [ 1319.194929][ T4380] BPF:[1] FUNC_PROTO (anon) 06:51:57 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000340)={0x0, 0x0}) [ 1319.202619][ T4380] BPF:return=268435456 args=( [ 1319.219159][ T4367] BPF:) [ 1319.224365][ T4367] BPF: [ 1319.230699][ T4380] BPF:0 (anon) [ 1319.240061][ T4367] BPF:Invalid return type [ 1319.258489][ T4380] BPF:, vararg [ 1319.263256][ T9706] libceph: connect (1)[d::]:6789 error -22 [ 1319.264878][ T4367] BPF: [ 1319.264878][ T4367] [ 1319.274205][ T9706] libceph: mon0 (1)[d::]:6789 connect error [ 1319.275401][ T4380] BPF:) [ 1319.283647][ T4380] BPF: [ 1319.290065][ T4380] BPF:Invalid return type [ 1319.294996][ T4380] BPF: [ 1319.294996][ T4380] 06:51:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x11000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1319.311965][ T4393] BPF:[1] FUNC_PROTO (anon) 06:51:57 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000040)={"8eff728ccd22bd3babee27bba4410c33"}) [ 1319.337475][ T4393] BPF:return=31232 args=( [ 1319.339967][ T4396] BPF:[1] FUNC_PROTO (anon) [ 1319.347295][ T4396] BPF:return=285212672 args=( [ 1319.352349][ T4396] BPF:0 (anon) [ 1319.355998][ T4396] BPF:, vararg [ 1319.360376][ T4396] BPF:) [ 1319.363446][ T4396] BPF: [ 1319.366702][ T4396] BPF:Invalid return type [ 1319.371319][ T4396] BPF: [ 1319.371319][ T4396] [ 1319.372658][ T4393] BPF:0 (anon) 06:51:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14}, 0x14}}, 0x0) [ 1319.414225][ T4396] BPF:[1] FUNC_PROTO (anon) [ 1319.419089][ T4396] BPF:return=285212672 args=( [ 1319.430727][ T4396] BPF:0 (anon) [ 1319.436465][ T4393] BPF:, 0 (anon) 06:51:57 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000340)={0x0, 0x0}) [ 1319.470349][ T4393] BPF:, 3 (invalid-name-offset) [ 1319.478870][ T4396] BPF:, vararg [ 1319.491778][ T4396] BPF:) [ 1319.495803][ T4393] BPF:) [ 1319.502088][ T4396] BPF: [ 1319.506696][ T8980] Bluetooth: hci0: command 0x0401 tx timeout [ 1319.507377][ T4393] BPF: [ 1319.520374][ T4396] BPF:Invalid return type [ 1319.532030][ T4393] BPF:Invalid return type [ 1319.539037][ T4396] BPF: [ 1319.539037][ T4396] [ 1319.554382][ T4393] BPF: [ 1319.554382][ T4393] 06:51:57 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f00000000c0)=0xffffffffffffffff) [ 1319.577456][ T9706] libceph: connect (1)[d::]:6789 error -22 [ 1319.596519][ T9706] libceph: mon0 (1)[d::]:6789 connect error 06:51:57 executing program 5: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='F', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000180)={0x0, r0}, 0x0, 0x0, 0x0) 06:51:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x12000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xa000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:57 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000340)={0x0, 0x0}) 06:51:57 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000000)={0x1f, @fixed}, 0x8) connect$bt_sco(r0, &(0x7f0000000140)={0x1f, @fixed}, 0x8) 06:51:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 06:51:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000034c0)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x40804) [ 1319.913901][ T4381] ceph: No mds server is up or the cluster is laggy [ 1319.978109][ T4440] BPF:[1] FUNC_PROTO (anon) 06:51:57 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) sendmmsg$inet6(r0, &(0x7f0000002880)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 06:51:57 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x802, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000140), 0xc) [ 1320.000358][ T4440] BPF:return=40960 args=( [ 1320.005898][ T4443] BPF:[1] FUNC_PROTO (anon) [ 1320.005960][ T4440] BPF:0 (anon) [ 1320.016322][ T4440] BPF:, 0 (anon) [ 1320.021186][ T4440] BPF:, 3 (invalid-name-offset) [ 1320.021645][ T4443] BPF:return=301989888 args=( [ 1320.041910][ T4440] BPF:) 06:51:57 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000200)) [ 1320.061107][ T4440] BPF: [ 1320.062072][ T4443] BPF:0 (anon) [ 1320.073105][ T4440] BPF:Invalid return type [ 1320.080794][ T4443] BPF:, vararg [ 1320.095475][ T4443] BPF:) [ 1320.098320][ T4440] BPF: [ 1320.098320][ T4440] [ 1320.105047][ T4443] BPF: 06:51:57 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000300)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in={0x2, 0x0, @remote}}}, 0x90) [ 1320.111793][ T4443] BPF:Invalid return type [ 1320.127502][ T4440] BPF:[1] FUNC_PROTO (anon) [ 1320.129553][ T4443] BPF: [ 1320.129553][ T4443] [ 1320.150088][ T4440] BPF:return=40960 args=( 06:51:57 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x81, 0x0) write$tun(r0, &(0x7f00000003c0)={@void, @val, @eth={@random="43629491d6c5", @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "1d2865", 0x1c3, 0x6, 0x0, @remote, @private0, {[@dstopts={0x0, 0x1b, [], [@generic={0x0, 0xd7, "949b7efe4f365e6cd246e7fc8d8df1309749ddebf689a1f5da7d4005f8ca6397e37f83e52e7d9fc065c21d3e4119d771a485a73638f6af1f641a90556cc8723617d9296461c2c5394d52c04a8612ec50d1959bbdaa908e9a7f9f914231da415afd141726c5ebfe8f3db420b31da70d736dc77ea6d60f070cea1064bb4b694c17e857507ba67ac1176370c172142fe4ef11ca5b01513fd08a276d51207986e905312f45e92a5495246555fcbccefd95eb681b58e2986ea84f721765b0aadbe8acbc93fd6efb9f58e6f0e524fc7f6a86fd2738cd3c49cb7e"}]}, @srh={0x0, 0xa, 0x4, 0x5, 0x0, 0x0, 0x0, [@private1, @ipv4={[], [], @dev}, @private1, @rand_addr=' \x01\x00', @ipv4={[], [], @broadcast}]}, @routing={0x0, 0x6, 0x0, 0x0, 0x0, [@private0, @private2, @private2]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4}]}}, {"4021dde6ac05f5ed1cdec091033111ca289cf5fd37a4b7ce93dae5d47e64101434fb6a1bdecb316770a70a7120b12eabb0ca19"}}}}}}}}, 0x207) 06:51:58 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000040)) [ 1320.173484][ T4457] BPF:[1] FUNC_PROTO (anon) [ 1320.179214][ T4440] BPF:0 (anon) [ 1320.185419][ T4457] BPF:return=301989888 args=( [ 1320.193187][ T4440] BPF:, 0 (anon) [ 1320.208563][ T4440] BPF:, 3 (invalid-name-offset) [ 1320.212013][ T4457] BPF:0 (anon) [ 1320.219236][ T4440] BPF:) [ 1320.225587][ T4457] BPF:, vararg 06:51:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x1e000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xfffff, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:58 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000180)={0x0, 0x2, 0x0, "213fceaff6632ec6860649b408a90dd10b314c248f446c2a73285f3ec9de08ce"}) 06:51:58 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000200)='ceph\x00', 0x0, &(0x7f0000000280)="9323f193f0efd864867b3219", 0xc, r0) [ 1320.233390][ T4440] BPF: [ 1320.233399][ T4440] BPF:Invalid return type [ 1320.233406][ T4440] BPF: [ 1320.233406][ T4440] [ 1320.237892][ T4457] BPF:) [ 1320.237909][ T4457] BPF: [ 1320.237915][ T4457] BPF:Invalid return type [ 1320.237921][ T4457] BPF: [ 1320.237921][ T4457] [ 1320.372326][ T4497] BPF:[1] FUNC_PROTO (anon) 06:51:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 06:51:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000c00)='802.15.4 MAC\x00', r0) sendmsg$IEEE802154_DISASSOCIATE_REQ(r1, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={0x0}}, 0x0) 06:51:58 executing program 3: socketpair(0x23, 0x0, 0xffffffff, 0x0) [ 1320.372339][ T4497] BPF:return=503316480 args=( 06:51:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x20000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x1000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1320.372347][ T4497] BPF:0 (anon) [ 1320.372353][ T4497] BPF:, vararg [ 1320.372358][ T4497] BPF:) [ 1320.372363][ T4497] BPF: [ 1320.372393][ T4497] BPF:Invalid return type [ 1320.372398][ T4497] BPF: [ 1320.372398][ T4497] 06:51:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_MODE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) [ 1320.383045][ T4500] BPF:[1] FUNC_PROTO (anon) [ 1320.383057][ T4500] BPF:return=503316480 args=( [ 1320.383066][ T4500] BPF:0 (anon) [ 1320.383071][ T4500] BPF:, vararg [ 1320.383078][ T4500] BPF:) [ 1320.383083][ T4500] BPF: [ 1320.383088][ T4500] BPF:Invalid return type [ 1320.383095][ T4500] BPF: [ 1320.383095][ T4500] [ 1320.405691][ T4503] BPF:[1] FUNC_PROTO (anon) [ 1320.405704][ T4503] BPF:return=1048575 args=( [ 1320.405712][ T4503] BPF:0 (anon) [ 1320.405719][ T4503] BPF:, 0 (anon) [ 1320.405726][ T4503] BPF:, 3 (invalid-name-offset) [ 1320.405733][ T4503] BPF:) [ 1320.405738][ T4503] BPF: [ 1320.405743][ T4503] BPF:Invalid return type [ 1320.405749][ T4503] BPF: [ 1320.405749][ T4503] [ 1320.425995][ T4504] BPF:[1] FUNC_PROTO (anon) [ 1320.426038][ T4504] BPF:return=1048575 args=( [ 1320.426046][ T4504] BPF:0 (anon) [ 1320.426053][ T4504] BPF:, 0 (anon) [ 1320.426061][ T4504] BPF:, 3 (invalid-name-offset) [ 1320.426067][ T4504] BPF:) [ 1320.426072][ T4504] BPF: [ 1320.426077][ T4504] BPF:Invalid return type [ 1320.426083][ T4504] BPF: [ 1320.426083][ T4504] [ 1320.522487][ T4519] BPF:[1] FUNC_PROTO (anon) [ 1320.522507][ T4519] BPF:return=16777216 args=( [ 1320.522514][ T4519] BPF:0 (anon) [ 1320.522522][ T4519] BPF:, 0 (anon) [ 1320.522530][ T4519] BPF:, 3 (invalid-name-offset) [ 1320.522536][ T4519] BPF:) [ 1320.522541][ T4519] BPF: [ 1320.522546][ T4519] BPF:Invalid return type [ 1320.522552][ T4519] BPF: [ 1320.522552][ T4519] [ 1320.532051][ T4522] BPF:[1] FUNC_PROTO (anon) [ 1320.532062][ T4522] BPF:return=16777216 args=( [ 1320.532070][ T4522] BPF:0 (anon) [ 1320.532077][ T4522] BPF:, 0 (anon) [ 1320.532085][ T4522] BPF:, 3 (invalid-name-offset) [ 1320.532247][ T4522] BPF:) [ 1320.532253][ T4522] BPF: [ 1320.532258][ T4522] BPF:Invalid return type [ 1320.532264][ T4522] BPF: [ 1320.532264][ T4522] [ 1320.536343][ T4520] BPF:[1] FUNC_PROTO (anon) [ 1320.536353][ T4520] BPF:return=536870912 args=( [ 1320.536361][ T4520] BPF:0 (anon) [ 1320.536436][ T4520] BPF:, vararg [ 1320.540802][ T4520] BPF:) [ 1320.540809][ T4520] BPF: 06:51:58 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003e80)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000001400)=[@dontfrag={{0x14}}], 0x18}}], 0x1, 0x0) 06:51:58 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000013c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={'fscrypt:'}, &(0x7f0000000180)={0x0, "01e9fcba657da9f5b9620213b8cbf6199a6f8e7d01fc7b391bf1c0c2afd70327531efd1c1fcc69f556eb8c0c8d90d51c66c865a1850f814f627ede02fb41296c"}, 0x48, r1) request_key(&(0x7f0000001300)='rxrpc\x00', &(0x7f0000001340)={'syz', 0x3}, 0x0, r2) 06:51:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x2000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 06:51:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x25000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:58 executing program 1: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0)='devlink\x00', 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x6) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x54, r0, 0x1, 0x0, 0x0, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x8}}]}, 0x54}}, 0x0) [ 1320.540815][ T4520] BPF:Invalid return type [ 1320.540821][ T4520] BPF: [ 1320.540821][ T4520] [ 1320.545545][ T4523] BPF:[1] FUNC_PROTO (anon) [ 1320.545554][ T4523] BPF:return=536870912 args=( [ 1320.545562][ T4523] BPF:0 (anon) [ 1320.545568][ T4523] BPF:, vararg [ 1320.545575][ T4523] BPF:) [ 1320.545580][ T4523] BPF: [ 1320.545585][ T4523] BPF:Invalid return type [ 1320.545592][ T4523] BPF: [ 1320.545592][ T4523] [ 1320.929773][ T4539] BPF:[1] FUNC_PROTO (anon) [ 1320.935461][ T4539] BPF:return=620756992 args=( [ 1320.946297][ T4539] BPF:0 (anon) [ 1320.954711][ T4540] BPF:[1] FUNC_PROTO (anon) [ 1320.960728][ T4539] BPF:, vararg [ 1320.968740][ T4544] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 06:51:58 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000180)) [ 1320.971306][ T4539] BPF:) [ 1320.982703][ T4540] BPF:return=33554432 args=( [ 1320.999048][ T4540] BPF:0 (anon) [ 1321.011180][ T4547] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1321.013328][ T4540] BPF:, 0 (anon) 06:51:58 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @empty}, 0x0, 0x2}, 0x20) 06:51:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0xffffffffffffff07, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x4}]}, @TIPC_NLA_NODE={0x4}]}, 0x20}}, 0x0) [ 1321.028738][ T4539] BPF: [ 1321.038538][ T4539] BPF:Invalid return type [ 1321.047669][ T4540] BPF:, 3 (invalid-name-offset) [ 1321.064127][ T4539] BPF: [ 1321.064127][ T4539] [ 1321.076317][ T4540] BPF:) 06:51:58 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x2, 0x0) write$ppp(r0, 0x0, 0x0) 06:51:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="410078bdf8ff000000000a00000006"], 0x20}}, 0x0) [ 1321.090208][ T4540] BPF: [ 1321.097182][ T4558] BPF:[1] FUNC_PROTO (anon) [ 1321.101135][ T4540] BPF:Invalid return type [ 1321.119463][ T4540] BPF: [ 1321.119463][ T4540] [ 1321.129999][ T4558] BPF:return=620756992 args=( 06:51:58 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) add_key(&(0x7f00000016c0)='id_legacy\x00', 0x0, 0x0, 0x0, r0) [ 1321.150346][ T4558] BPF:0 (anon) 06:51:58 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000700)={@dev, @dev, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa80122}) [ 1321.172343][ T4558] BPF:, vararg [ 1321.180514][ T4563] BPF:[1] FUNC_PROTO (anon) [ 1321.191113][ T4558] BPF:) [ 1321.203257][ T4563] BPF:return=33554432 args=( [ 1321.209249][ T4558] BPF: 06:51:59 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{r0}], 0x1, &(0x7f00000002c0)={0x0, 0x3938700}, 0x0, 0x0) [ 1321.219536][ T4558] BPF:Invalid return type [ 1321.229893][ T4563] BPF:0 (anon) [ 1321.252354][ T4563] BPF:, 0 (anon) [ 1321.255590][ T4558] BPF: [ 1321.255590][ T4558] [ 1321.263014][ T4563] BPF:, 3 (invalid-name-offset) [ 1321.277982][ T4563] BPF:) [ 1321.288222][ T4563] BPF: [ 1321.299453][ T4563] BPF:Invalid return type [ 1321.313244][ T4563] BPF: [ 1321.313244][ T4563] 06:51:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x3000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:59 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x0, @local}], 0x10) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080), 0x4) 06:51:59 executing program 5: ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000074380)={0x1f, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "5553fee120e558"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000075380)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "b89869e6b89143"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000076380)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000077380)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x20, "b11595a37a3ff8"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000078380)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000078580)={0x0, 0x0, "fdd691ef673b1669f52fc2d2f0818f1e9ec192123188e71351791c27cc05c1744b623a80565a9cf0c0aa4932829bc87ce98404caa5907cb8f6c9b42ef7021bf5854a6be1781892d6ab9c1774d1b60e867846baa2b99bc97e218447cbe292fd645780a8d011c44966563d3f7d37455a61394d88785a4f20e65e152ee99b06d4857fdc35f223e629cd88b7a535f5f98cbe98454ba21c2046ff863087b8a026dd42c5cf89caaac1c5d93576f68a9b165e68d90f4e4ae18524ca0054f2fd543bea3f5d89ab148ba19539351be7b4248a7409372a423f1d99b0fe7406f4ba0a906d5ee9f9e582a5e7b01d4486b0b4032ada97fd1047fbbc399fb1fb00c6936860186f", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000079580)={0x0, 0x0, "97ddcbd8fa55d5ca17264eb615fd92dd5c7d512cec4ba702e760e877a2d6fc200de8e623e72c861d3321d263933026de084757dd876318c010eb9b79192f283bc4889d043e9ee95d13a4983f738e88429fd22ab4970da740a4ca78d5a8f211d7091cf4296670d6f6c5909ee58e7d412b0b200bbc9b15a165dd7de2a4b1f8071ced27c43fff93d3dabfac9d69705597a85c3ce421ea197802afffb6de645c4e2818428674d2bb96e1a6b090f72519ad77311c5e868b34d7efd8112050994c6a64545b777d736790d09fb1f24b2f71329f224e697bf49185e72c5cd5808aeeed5e86a1de228ccfdf5746e7afc4d50b9a0af42075e5481af6dc3b0daee926615bc7", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000007a580)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000007b580)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000007b780)={0x0, 0x0, "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", "f7b2afe8ad86b865b721158da77be4f84db0235d3ded6111c275996bf892941640ba6a4dc2e7f9770195da497207a48ef46362f29f29776e7b0041c0554781b3cc92bc83617bc6ada61d38696275a26a42b203c6b92124af2dd11259a293fa73163a0d8dc8f0706d312134ac693cecaa6d85f2e851dc88675ebc2114ea0593239c16ffa3d247700af1b8f648b53c37c8e6007c9429b7785ed54582bb9ac19a002fe69c17af18c5ff3e2bdd9a52c6d08f26b420ca6881ff0c789a37fb168fefb37245c90467cb305335d4bbed206211c62f144c588fed9d55a98faf93e0e57cee9cb89630a904817b184b8d478eaa806843f680724b66aa87fa68460e4a2ad9ce907d327fb56645b8cadb3b21edd800d2d3a07dcfb0bd00dddd0adb030d5a3c89dd851d8a78e3df4eb815b8477dbe236fc28785ad0a8ca5c5aba60353f82f0ede483a8748bd712a1d7d6f6c6d7ee005fcd8a1bac0fa029723e01b0865ca06cdd492df58d3e8180b89315cac0fb84c1e899d0f6bbae6b36af4f3e121f4898d05e0c420f6d9d51647d25a42eb60685d8695b26d7573c1dbf3f9570a681fe205e482abf3460fc24aa3f3a62ed852deae2bb7bc477867bd1dd97c6b89d6ec95374f5926fb9e00c914e03e62f2a243d211d45a6e8ecd594a990d319aaf251c85148d154bab6379dc5bd71472d3a89473e29801f383f37fe727662fd8034543db75d53c5170c80909cde0975002764dc027e8e8e1a26bca7b3d032ade1f1fee95ce69518e5ec170b368f9190d274739fc58864312de7966e486b266934bf3a3a859629cff65b070022b7a390ece5a72b823d8cd292660a461868eeec4a58b55c8ece3fcaf878a6846b3684e45f5a9b0e1afff1b84b63c95c14929ceffcac7a4a14d625f43075d2ea2e02a6b8acd2a94fc2d1cfa44271295024d84c2d39b0341a8ea1052276ef0d7ef878899178f74cb9585702735aebaff30e7fad0c4b8877be6d82242f2c9d540572d8b0b9d9f353f2982e2bddf18e3f0dd517c3efa84078c49653471716d329fa1baa3feea90f7da59bcdd7415c7408d3155baad59f58f43560de2c8e7909ba398ac26a45bb59e9709ac05fcf1713b308a08da593287fe8ddcb0db5a2eaba6d395ab9139fe990c4050a6949866dbb6515d51bea2a8bdba271f794722fba90e236b6602cab12092814d29c2a69280d8fbd7acb274a155dca59c92f2684a5ca5150aa63f58ca00c7782dc8bfb79d2d573a254791465921f9b70a1e38dda1a240b479a097e1e3b8124563c5bc24e6c8b567ba47a5d5118e2122c30a0c6435cc6fd0072d6a01313f088221ade7e9f3e22febda87ab68b520f53fd2635a02068d82a2173c712b2c70c740c70462c0515e84bcf4c2227fecbf93becd2e63a7ded5f2b9062423d681e6e470e9cffae7dee6e1f37a94b4fa0953afdae03d3f88675bd703d7d44860db32476df282c59e0f60f758c17228912e32a234ce59052bf78f7104456b463c4cd4cbd09eb00b49e9fc05f06ca2dd2be824b59255debbdf43c95493ac3566317651512e09b87a3aa6ef29f54ad195dacef6646ef6226613175a89e1c9b844027618a29dcd857bd30ab62621530ed11d77eaee5d46971a4d155f9d0ba31e609e6da05bf60f91614bbb1b09253b2b062b2cd65bbb9fc561bc8a9739b7933481b4a46c00d9469cd7358a9570d057951c2fa7bc94d16e05aa96717d4a769e42d6f05e5fd1d7eed17fdeb8432343eb400a70f5f415698d2a64a6c8af8c269c1e2eac4c17538fece928a7cef16bf5068be6f77185278d5afa222256cfbed17b032ecb8a7d1e455f50657537225a08ead2a50d1963ad2d4614c4b867e4a14f864c7dc6306372cbb6b117e543db804f55c1a941c053601435d3227cb71c9ba6ab0fa1c8bbe0ff0e4e3252d1a7845685e966e2c0260594a83ceb8062cb4292c1a17076f18f6c8d6e1afb1f5784528b14eaa312768a74a57e4ea8dfa97fb089bccce547d0b6842a3f03db2f8029ccb0fb5c61c1095b28c77a6f57b35df4c93f748b3df6b74cbe57a8e4616bf43c6292116445a9230a80119d6b3904229130ab7b7796eee6306e35c29a2dbc48c3c8b86fbd2f882f125816dcf527ae2081f9f79ce38321ee28073a782e4a4f4a6e7d16466e42f43f3b6d391799f84e5d733ec17322718d17367a08493a41e4150485ba9958266ce4ec80bcf0a8b9536b03b9c471445bfdd27ee1a37532a8d41616eba09512a8cc6a85c4223ff91958f5bb3695877379972b27a5c34ae42fba0063980f163b5f0aab1c6bbadf4c8ebaba2d7f872e5a31c7bef26d73862b018a8fc2c39a5333ca02a42331a15cc8202716e7f657d07f31e05e4a5645442f59f1c9a584a1f55faa102ff46c16801ebfbb734a7e605d31c393385aad56d132ea925a4c1dbf89462117c4adb02d4ecb4b74834fc6445cc9a948203bad1dde22e60c0fd8b851ff8948b365d11ecb7b59b47bd2a761d35c8e1ecef6cf6d4e266d56726a3c8a1e33c8e9ae4ec483c3d93e9006d9e2a835aa7beff798ac3b4780b4712ed8f3e40f18093ea034d4ca4b764ee5d855934efc58db2e16ca43bd57abc227980cae26fcb0b24fccf3c6934a31a0964e9dc5a2123db340551881d9530f2922c127e6262b9b12597009b14f321d45065211cf216a8a1a6a2b95293ab01a30b103f1dc88877200ff3fe021a09bb99befbaf174631221a0b190330895fd570ddf056af26845ad922972a1b1ab6b7a1851d5a8e5412b4c050073cc0ff37a65b2719163f8a00449c31483b93eee5692bdb24d5d9cdedf61fabd13a7313b1f4749eaa3f9d5dbda2e00db20d395e12c6c8602908cbf62741ee4d1186aeafc5ecf578935a59e575d30be50272a1e97e7be7d20b367347bffaa70bea1fa0d1c2ba83aaa84433b74ba99ef24120219bdd9b3b9b894bf099f6086aff725d0a3098ce6a40a2d9c1d4cbeb988645e292259994cd271481a05a6c3df33d43df4fb000c797cefe1bd1adce98080a8809186bbf1ed0877803465a89a4d0c9f71a683b9986d5f291c56968abac3b1864f1716e62b58d4841c06aaa1facccefed1bdc1c416cd617006d0dd15f825c96c1b16f72bd5f77166d5c0a187efb92729559a4775f64faad2523841f55766ab10ac8f37cad3c6f36c2bbee27fce5e7a8bd27627b174819447420f203731132bfd6237d9d297e76770018aef2dac5a5fe13a6b29da265bc578cc36106057d3c9f4000cd6017c7c8f12fc7f23feb48ef3518881d874681aa90f7bff85f30446cb88834fab3a6af6f3ae2dd4097fd1844338444eaf379cfc9ac6c76c775a9fe9ce635df6ef6f85e69b1fdcd4fdf1a94cd8575b2d96718006a344db84a424da8bc9e1220278beda4b0983c8c3664f86656f78412cccce3ba55f3650741975c0a38cadd44571cf30e652387eb0a593e296f2c85092d46d91ee806d90cb2da651ac1c9af198510bf6b664b00dcc73ef53ac651f859def4b3bfe19328ebbe7cc230213983306e979923c56fce4225aab8071d1d6a6d5cae7e40378f75d084669f2cf5db96bf316c26b10714e39b7733358d1c4bc306bcdd62aa5c76ddbf3f335da3e84d282eb1695543ead9b20b1773bad5dd43cc0100051662eee2075f420274878a2770ac6702e0725ccf66c18de6454ff04df30b48aca82b4e196a703afe4aed15f630bd930dba323fe2b5287ceeb7883bbe6ce48f24e3fdc6fd0c47b2b5b21679d008179c57d2ffd2756ac0fffa4ce4a4a6bdc2f1ea46614f58dc6033820e9768a827a5aeaa682f55ef3f5591479fb709bb17e774efeb5d4f17fd49cfc634d6bfb50f173ec6eba635fc8879572f08685805a8fec995e8472a5456d27a85d70d355e5b00c59e13943769a67f463811a30a1843fb6c082e7f26572527bac156f31f820edbcbbf640b88795fd08a94035c0cd2f772db82c90cc80771f17cd6c58223ee0d22797a2cd9b0c9c2d7c7be2ee0268d96dc9600de5fe1100d462a6cfa2586d80ccf8dad3185a9a1ade5774ef85c30375ed3178e5b09b6c0f068d4f0f7780fc6616098722b2ea25e22197315b3f0eb399ce35b35637699bca6163e826bf4178bbf3a5496ecbceee6b4fe77ae0ea15b825825aee2d97d80ca256310304eb9ad3cdba876a899a5ac32361d08309a42caecfd0299286a21cbb26606db4b363c9d3f9a76ee7d3e450f4cd54d28da5b025c2567d87e46d745da83b4c2cba4c7c5066a25c07aa73a98df56d09d3772fc3df4b96127dda94879879c70f80692425a6de76cab085f068392ae423f70e8fac61f948b3c2294ce4c02518612baffbec525bbec7c839afe3f57d8d4393062019be41c37ec273d2a1e7ce9a5715499ee4029a9be05743f34a3bfbf5222f0e2741742f135597e0bed79051f82225c167bee37c6f6903f4e3f521eaa6c779c0a7e13c3c2dd2e3dfb1c7795701d514cd0b9ac3e03585e5ca0895e405bc7cd99e9584937e39cbf3f6b09cb9ef6360700fc2588d8cc3ecf288f55364ce79ba34965704ef7903824551ec3e7bf06b2611b431db048fbaa8000535aaa0480ead2f592d361eb0a1419abd26b05320b949802daf0d4d2644d04205146a9cb4544b4bd18897c6bb42d27bab11879e1bbc7141f461a54d61c6f1fc235d8ae58c6e2123f96494c1585cee19ae3ac55ab9fe811f5b5bfaa8b1eabca030e3b04488adadd31b36806daceaab6126bd21883aeab5ecf077f46ea4f2cfd7a4ac151881358ebb9663cf8686d951a0d92be6afae4d70cf457d5839951dcf108d20775f264f01cc65f7288c12f49c223085b0759809bd94e619c91f1c0f546986ac4cd315857e51f7bc0e029c4effe6f3af07a6e5d91e23a841eef1134b31a6c60f0a37d3cdbbd55f94855c027af565d83991c074d5060a440dd800568f0c096703d6635e1202576cf43f8e9e5ef05c573c9f456ba9719656186fafd9a4468b0989f59ebf70a1c36017c5c573a89ebe709cec773f0a864e50bc236a9476c93d05466b4bc27d8cf54b998d541c32f08483c57a450cecdbd5d65c2e68ba00cbd5ed928ab9270ed10ec50b80bdfe2f72a00da541587fd5d967209786e71008f255d5cf4b17f644be2c1bb3564005b670aa6b2b458edf91b5f8e0bc0aadfc5189d79142641194d1457e5ef1de528248e0f95d71e19d77877ab0c85249834bdabdd5d1137a2d02dc9dc4b4ffd70be29ad1c83b27941b6e6d9ac7f0dbbea89d7ca643da3deb029c07092c4aeab61e0569e212649ea05c30f6f37c3c1d7802cb6b7de949cd5a7c663b4fc7b1254a152d2873ecbb2f7d2e643427d06307b720c42443ba64ec21a401e882102cdaacede8a5973d3ba542e40220e0b085b8a451895f9b27b4c401bbf0f93f1ca654ab9c6e17bc1b2a43c25cb6e88e41"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007c780)={0x7fffffff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3, "e0e790767a6c74"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000007d780)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000007e780)={0x0, 0x0, "c57f7fafef969ccbc567156a111b859d90408508b8612e002d62144faf5d9714975bba55980cc5231582092d7dba5445bcc0576f2ef25dbb0ac53310aa73e5d60c0a796e9d501fc58ba296e006755d15ab6a8195ef305d2649edaf395eaa0d3d231c94997773ba1ff9c12c0de24fd7b148d7587d726eb9282fbb47755bfc1d4e77aa79050a370605e35499abe5a1536dd6dbe40f071d95f2b5159b5e77f0c99d3c9625af9af0fa5dbb5699d0435c1ab58bdb05f1ed56b1fe752e0c2705f79986553c4f68c014085278ae694fb043fadfab0a1a24e44b90458a773cafc5190ca510666441a25879d49120a3b511351c86034d8982ea989b2432bff39b760b12e3", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007f780)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x9, "6fa1bd44a7bd3e"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000080780)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000080980)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r0}, {}, {}, {r1}, {}, {}, {}, {0x0, r2}, {r3}, {0x0, r4}, {r5}, {}, {0x0, r6}, {0x0, r7}, {0x0, r8}, {0x0, r9}, {r10}, {0x0, r11}, {}, {r12}, {r13}, {0x0, r14}], 0x25, "030d3b3312266f"}) r15 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r15, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r15, 0x8916, &(0x7f0000000040)={@private2, 0x41, r16}) ioctl$sock_inet6_SIOCADDRT(r15, 0x890b, &(0x7f0000000700)={@empty, @dev={0xfe, 0x80, [], 0x14}, @remote, 0x6, 0x9, 0x7, 0x800, 0x0, 0x200220, r16}) 06:51:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003e80)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000001400)=[@dontfrag={{0x14}}, @dstopts_2292={{0x18}}, @hoplimit_2292={{0x14}}], 0x48}}], 0x1, 0x0) 06:51:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x43000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:51:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000002680)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000600)=[{&(0x7f0000000080)="da", 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) [ 1321.406757][ T4585] BPF:[1] FUNC_PROTO (anon) [ 1321.421260][ T4591] BPF:[1] FUNC_PROTO (anon) [ 1321.427431][ T4591] BPF:return=50331648 args=( [ 1321.432886][ T4585] BPF:return=1124073472 args=( [ 1321.432961][ T4591] BPF:0 (anon) [ 1321.443054][ T4591] BPF:, 0 (anon) [ 1321.447628][ T4591] BPF:, 3 (invalid-name-offset) [ 1321.453722][ T4591] BPF:) 06:51:59 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x0, @local}], 0x10) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080), 0x4) 06:51:59 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000100)='/dev/video#\x00', 0x5, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000140)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "647dae30"}, 0x0, 0x0, @userptr}) [ 1321.456365][ T4585] BPF:0 (anon) [ 1321.458249][ T4591] BPF: [ 1321.464289][ T4591] BPF:Invalid return type [ 1321.469660][ T4591] BPF: [ 1321.469660][ T4591] [ 1321.475242][ T4585] BPF:, vararg [ 1321.493001][ T4585] BPF:) [ 1321.493580][ T4595] BPF:[1] FUNC_PROTO (anon) [ 1321.503298][ T4585] BPF: 06:51:59 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000034c0)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}], 0x1, 0x40d4) [ 1321.509025][ T4585] BPF:Invalid return type [ 1321.516827][ T4595] BPF:return=50331648 args=( [ 1321.529208][ T4585] BPF: [ 1321.529208][ T4585] [ 1321.534200][ T4595] BPF:0 (anon) [ 1321.542353][ T4595] BPF:, 0 (anon) [ 1321.553506][ T4595] BPF:, 3 (invalid-name-offset) 06:51:59 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x0, @local}], 0x10) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080), 0x4) 06:51:59 executing program 3: mlockall(0x3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100)='ethtool\x00', 0xffffffffffffffff) [ 1321.559976][ T4601] BPF:[1] FUNC_PROTO (anon) [ 1321.574252][ T4601] BPF:return=1124073472 args=( [ 1321.576388][ T4595] BPF:) [ 1321.593383][ T4595] BPF: [ 1321.594687][ T4601] BPF:0 (anon) [ 1321.597157][ T9611] Bluetooth: hci0: command 0x0405 tx timeout 06:51:59 executing program 5: r0 = shmget$private(0x0, 0x4000, 0x78000182, &(0x7f0000ffb000/0x4000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x0) [ 1321.610215][ T4601] BPF:, vararg [ 1321.617583][ T4595] BPF:Invalid return type [ 1321.623504][ T4601] BPF:) [ 1321.630026][ T4601] BPF: [ 1321.633961][ T4595] BPF: [ 1321.633961][ T4595] [ 1321.640268][ T4601] BPF:Invalid return type 06:51:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x4000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:51:59 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x0, @local}], 0x10) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080), 0x4) 06:51:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x48000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1321.663657][ T4601] BPF: [ 1321.663657][ T4601] 06:51:59 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) ppoll(&(0x7f0000000240)=[{r0}], 0x1, &(0x7f0000000280)={0x0, 0x3938700}, 0x0, 0x0) 06:51:59 executing program 1: syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000c00)='802.15.4 MAC\x00', 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 1321.743648][ T4615] BPF:[1] FUNC_PROTO (anon) [ 1321.750300][ T4617] BPF:[1] FUNC_PROTO (anon) [ 1321.759689][ T4615] BPF:return=1207959552 args=( [ 1321.771080][ T4617] BPF:return=67108864 args=( [ 1321.778979][ T4615] BPF:0 (anon) [ 1321.788772][ T4615] BPF:, vararg [ 1321.794581][ T4617] BPF:0 (anon) [ 1321.797137][ T4615] BPF:) [ 1321.810510][ T4617] BPF:, 0 (anon) [ 1321.815927][ T4615] BPF: [ 1321.825836][ T4617] BPF:, 3 (invalid-name-offset) [ 1321.831643][ T4615] BPF:Invalid return type [ 1321.843174][ T4617] BPF:) [ 1321.844640][ T4615] BPF: [ 1321.844640][ T4615] [ 1321.851032][ T4617] BPF: [ 1321.859936][ T4617] BPF:Invalid return type [ 1321.870609][ T4617] BPF: [ 1321.870609][ T4617] [ 1321.880082][ T4615] BPF:[1] FUNC_PROTO (anon) [ 1321.886858][ T4615] BPF:return=1207959552 args=( [ 1321.890710][ T4627] BPF:[1] FUNC_PROTO (anon) [ 1321.900319][ T4615] BPF:0 (anon) [ 1321.905745][ T4627] BPF:return=67108864 args=( [ 1321.916426][ T4627] BPF:0 (anon) [ 1321.921617][ T4615] BPF:, vararg [ 1321.929481][ T4627] BPF:, 0 (anon) [ 1321.936518][ T4615] BPF:) [ 1321.938513][ T4627] BPF:, 3 (invalid-name-offset) [ 1321.942835][ T4615] BPF: [ 1321.952978][ T4615] BPF:Invalid return type [ 1321.964117][ T4627] BPF:) [ 1321.968013][ T4615] BPF: [ 1321.968013][ T4615] [ 1321.975986][ T4627] BPF: [ 1321.982824][ T4627] BPF:Invalid return type [ 1321.990945][ T4627] BPF: [ 1321.990945][ T4627] 06:52:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000010c0)=@file={0x0, './file0\x00'}, 0xa) 06:52:00 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x802, 0x0) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x0) 06:52:00 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$read(0xb, r1, &(0x7f0000000180)=""/4096, 0x1000) 06:52:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x5000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x4c000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1322.334306][ T4651] BPF:[1] FUNC_PROTO (anon) [ 1322.352659][ T4651] BPF:return=1275068416 args=( [ 1322.359774][ T4655] BPF:[1] FUNC_PROTO (anon) [ 1322.371989][ T4655] BPF:return=83886080 args=( [ 1322.384151][ T4651] BPF:0 (anon) [ 1322.392641][ T4655] BPF:0 (anon) [ 1322.393401][ T4651] BPF:, vararg [ 1322.408927][ T4655] BPF:, 0 (anon) [ 1322.413835][ T4651] BPF:) [ 1322.418957][ T4655] BPF:, 3 (invalid-name-offset) [ 1322.420989][ T4651] BPF: [ 1322.434516][ T4651] BPF:Invalid return type [ 1322.443750][ T4655] BPF:) [ 1322.447112][ T4651] BPF: [ 1322.447112][ T4651] [ 1322.452524][ T4655] BPF: [ 1322.462448][ T4655] BPF:Invalid return type [ 1322.466256][ T4660] BPF:[1] FUNC_PROTO (anon) [ 1322.472814][ T4655] BPF: [ 1322.472814][ T4655] [ 1322.479717][ T4660] BPF:return=1275068416 args=( [ 1322.491649][ T4660] BPF:0 (anon) [ 1322.498600][ T4660] BPF:, vararg [ 1322.507108][ T4660] BPF:) [ 1322.512400][ T4660] BPF: [ 1322.520603][ T4660] BPF:Invalid return type [ 1322.529043][ T4660] BPF: [ 1322.529043][ T4660] [ 1322.529327][ T4661] BPF:[1] FUNC_PROTO (anon) [ 1322.540447][ T4661] BPF:return=83886080 args=( [ 1322.545230][ T4661] BPF:0 (anon) [ 1322.550407][ T4661] BPF:, 0 (anon) [ 1322.554029][ T4661] BPF:, 3 (invalid-name-offset) [ 1322.559612][ T4661] BPF:) [ 1322.562445][ T4661] BPF: [ 1322.565261][ T4661] BPF:Invalid return type [ 1322.571885][ T4661] BPF: [ 1322.571885][ T4661] 06:52:00 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000013", 0x5, 0x800}, {0x0, 0x0, 0x8005400}], 0x0, &(0x7f0000000080)) 06:52:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1000000000000004, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pread64(r1, 0x0, 0x0, 0x0) 06:52:00 executing program 0: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) lchown(&(0x7f0000000240)='./bus/file0\x00', 0x0, 0xffffffffffffffff) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fdatasync(r0) 06:52:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x60000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x6000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1322.832575][ T4676] BPF:[1] FUNC_PROTO (anon) [ 1322.844157][ T4676] BPF:return=1610612736 args=( [ 1322.850905][ T4675] BPF:[1] FUNC_PROTO (anon) [ 1322.864924][ T4676] BPF:0 (anon) [ 1322.873941][ T4675] BPF:return=100663296 args=( [ 1322.878007][ T4676] BPF:, vararg 06:52:00 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) 06:52:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1000000000000004, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pread64(r1, 0x0, 0x0, 0x0) [ 1322.892110][ T4676] BPF:) [ 1322.906157][ T4676] BPF: [ 1322.906238][ T4675] BPF:0 (anon) [ 1322.915341][ T4682] loop3: detected capacity change from 0 to 264192 [ 1322.925070][ T4682] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1322.925806][ T4676] BPF:Invalid return type [ 1322.936628][ T4682] EXT4-fs (loop3): group descriptors corrupted! [ 1322.945514][ T4675] BPF:, 0 (anon) [ 1322.955551][ T4675] BPF:, 3 (invalid-name-offset) [ 1322.976973][ T4676] BPF: [ 1322.976973][ T4676] [ 1322.983312][ T4675] BPF:) [ 1322.986300][ T4675] BPF: 06:52:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1000000000000004, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pread64(r1, 0x0, 0x0, 0x0) [ 1322.989630][ T4675] BPF:Invalid return type [ 1322.989728][ T4695] BPF:[1] FUNC_PROTO (anon) [ 1322.994068][ T4675] BPF: [ 1322.994068][ T4675] [ 1323.007200][ T4692] overlayfs: filesystem on './file0' not supported as upperdir [ 1323.022390][ T4696] BPF:[1] FUNC_PROTO (anon) [ 1323.026036][ T4695] BPF:return=1610612736 args=( [ 1323.032464][ T4695] BPF:0 (anon) [ 1323.036066][ T4695] BPF:, vararg [ 1323.040696][ T4695] BPF:) [ 1323.043823][ T4695] BPF: [ 1323.046726][ T4695] BPF:Invalid return type [ 1323.057843][ T4682] loop3: detected capacity change from 0 to 264192 [ 1323.057994][ T4695] BPF: [ 1323.057994][ T4695] [ 1323.071056][ T4696] BPF:return=100663296 args=( [ 1323.078092][ T4696] BPF:0 (anon) [ 1323.082043][ T4696] BPF:, 0 (anon) [ 1323.086126][ T4696] BPF:, 3 (invalid-name-offset) 06:52:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x68000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x7000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1323.096892][ T4696] BPF:) [ 1323.099909][ T4696] BPF: [ 1323.102888][ T4696] BPF:Invalid return type [ 1323.107271][ T4696] BPF: [ 1323.107271][ T4696] [ 1323.129041][ T4705] BPF:[1] FUNC_PROTO (anon) [ 1323.133682][ T4705] BPF:return=1744830464 args=( [ 1323.138594][ T4705] BPF:0 (anon) [ 1323.141968][ T4705] BPF:, vararg 06:52:00 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000001bc0)=[{&(0x7f00000009c0)="bc", 0x1}, {&(0x7f0000000ac0)='~', 0x1, 0xffffffffffffff7f}, {0x0}]) [ 1323.145411][ T4705] BPF:) [ 1323.148873][ T4705] BPF: [ 1323.149744][ T4682] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1323.151636][ T4705] BPF:Invalid return type [ 1323.151645][ T4705] BPF: [ 1323.151645][ T4705] [ 1323.152634][ T4706] BPF:[1] FUNC_PROTO (anon) [ 1323.175732][ T4706] BPF:return=1744830464 args=( [ 1323.181551][ T4706] BPF:0 (anon) [ 1323.185186][ T4706] BPF:, vararg [ 1323.188711][ T4706] BPF:) [ 1323.191526][ T4706] BPF: 06:52:01 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000013", 0x5, 0x800}, {0x0, 0x0, 0x8005400}], 0x0, &(0x7f0000000080)) [ 1323.194536][ T4706] BPF:Invalid return type [ 1323.199032][ T4706] BPF: [ 1323.199032][ T4706] [ 1323.217379][ T4682] EXT4-fs (loop3): group descriptors corrupted! [ 1323.238005][ T4710] BPF:[1] FUNC_PROTO (anon) [ 1323.242624][ T4710] BPF:return=117440512 args=( 06:52:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000000)={@empty, 0x0, r3}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x21}, 0x0, r3}) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x8040) 06:52:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x6c000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:01 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x202f) write$FUSE_LK(r0, &(0x7f00000020c0)={0x28, 0x0, r1}, 0x28) read$FUSE(r0, &(0x7f0000002140)={0x2020}, 0x2020) [ 1323.247446][ T4710] BPF:0 (anon) [ 1323.250851][ T4710] BPF:, 0 (anon) [ 1323.258967][ T4710] BPF:, 3 (invalid-name-offset) [ 1323.263845][ T4710] BPF:) [ 1323.267243][ T4710] BPF: [ 1323.270126][ T4710] BPF:Invalid return type [ 1323.274454][ T4710] BPF: [ 1323.274454][ T4710] 06:52:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xf4240, &(0x7f00000001c0)=@framed={{}, [@btf_id]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0xaf, &(0x7f0000000280)=""/175, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1323.320520][ T4713] BPF:[1] FUNC_PROTO (anon) [ 1323.337799][ T4713] BPF:return=117440512 args=( [ 1323.346153][ T4722] BPF:[1] FUNC_PROTO (anon) [ 1323.382508][ T4713] BPF:0 (anon) [ 1323.394197][ T4722] BPF:return=1811939328 args=( [ 1323.409756][ T4713] BPF:, 0 (anon) [ 1323.423426][ T4713] BPF:, 3 (invalid-name-offset) 06:52:01 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) [ 1323.439883][ T4722] BPF:0 (anon) [ 1323.440217][ T4713] BPF:) [ 1323.451832][ T4722] BPF:, vararg [ 1323.456094][ T4713] BPF: [ 1323.459120][ T4713] BPF:Invalid return type [ 1323.474822][ T4713] BPF: [ 1323.474822][ T4713] 06:52:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x8000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1323.487842][ T4722] BPF:) [ 1323.490623][ T4722] BPF: [ 1323.493419][ T4722] BPF:Invalid return type [ 1323.497787][ T4722] BPF: [ 1323.497787][ T4722] [ 1323.522922][ T4736] BPF:[1] FUNC_PROTO (anon) 06:52:01 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000006300)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f00000042c0)={0x2020}, 0x2020) write$FUSE_BMAP(r0, &(0x7f0000000000)={0x18, 0x0, r1}, 0x18) [ 1323.546633][ T4736] BPF:return=1811939328 args=( [ 1323.551447][ T4736] BPF:0 (anon) [ 1323.554886][ T4736] BPF:, vararg [ 1323.565009][ T4736] BPF:) [ 1323.576900][ T4736] BPF: [ 1323.579698][ T4736] BPF:Invalid return type [ 1323.584022][ T4736] BPF: [ 1323.584022][ T4736] 06:52:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x74000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) [ 1323.625866][ T4751] BPF:[1] FUNC_PROTO (anon) 06:52:01 executing program 3: bpf$MAP_CREATE(0xa, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) [ 1323.671696][ T4751] BPF:return=134217728 args=( [ 1323.679235][ T9611] Bluetooth: hci0: command 0x0405 tx timeout [ 1323.693923][ T4751] BPF:0 (anon) [ 1323.709383][ T4751] BPF:, 0 (anon) [ 1323.712974][ T4751] BPF:, 3 (invalid-name-offset) 06:52:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="0121bd0dff0f0000b469f4ff0000000045b75000ffffffff2ca8f0ff00000000183b000003000000000000000000000085100000fcffffff1833000002000000000000000000000018160000", @ANYRES32, @ANYBLOB="f0"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xe6, &(0x7f0000000140)=""/230, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1323.727413][ T4765] BPF:[1] FUNC_PROTO (anon) [ 1323.732086][ T4765] BPF:return=1946157056 args=( 06:52:01 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x9, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:52:01 executing program 3: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/cgroup\x00') ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) [ 1323.777486][ T4751] BPF:) [ 1323.780860][ T4765] BPF:0 (anon) [ 1323.785419][ T4751] BPF: [ 1323.791482][ T4765] BPF:, vararg [ 1323.795242][ T4751] BPF:Invalid return type [ 1323.807694][ T4765] BPF:) [ 1323.815177][ T4751] BPF: [ 1323.815177][ T4751] 06:52:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x5, &(0x7f00000001c0)=@framed={{}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7a}]}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0xaf, &(0x7f0000000280)=""/175, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1323.825959][ T4765] BPF: [ 1323.836732][ T4765] BPF:Invalid return type [ 1323.849006][ T4777] BPF:[1] FUNC_PROTO (anon) [ 1323.855961][ T4765] BPF: [ 1323.855961][ T4765] [ 1323.871195][ T4777] BPF:return=134217728 args=( [ 1323.898129][ T4777] BPF:0 (anon) [ 1323.902321][ T4777] BPF:, 0 (anon) [ 1323.905870][ T4777] BPF:, 3 (invalid-name-offset) [ 1323.935209][ T4777] BPF:) [ 1323.946571][ T4777] BPF: [ 1323.958550][ T4777] BPF:Invalid return type [ 1323.966834][ T4777] BPF: [ 1323.966834][ T4777] 06:52:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a0, &(0x7f0000000000)={@rand_addr=' \x01\x00'}) 06:52:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x100, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x0) 06:52:01 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2401, 0x7) 06:52:01 executing program 0: bpf$MAP_CREATE(0x8, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 06:52:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x7a000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x9000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:01 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x7f}) [ 1324.045384][ T4808] BPF:[1] FUNC_PROTO (anon) [ 1324.062961][ T4810] BPF:[1] FUNC_PROTO (anon) [ 1324.064408][ T4808] BPF:return=150994944 args=( [ 1324.081773][ T4808] BPF:0 (anon) [ 1324.086404][ T4810] BPF:return=2046820352 args=( 06:52:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:01 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000180)) ptrace(0x10, r1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$pokeuser(0x6, r1, 0x388, 0xb8) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) [ 1324.105067][ T4810] BPF:0 (anon) [ 1324.113135][ T4810] BPF:, vararg [ 1324.116220][ T4808] BPF:, 0 (anon) [ 1324.125275][ T4808] BPF:, 3 (invalid-name-offset) [ 1324.135123][ T4808] BPF:) [ 1324.139043][ T4810] BPF:) [ 1324.142825][ T4808] BPF: [ 1324.151045][ T4808] BPF:Invalid return type 06:52:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000011180), 0x62, 0x0) 06:52:02 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x1, &(0x7f00000004c0)=@raw=[@ldst={0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x10}], &(0x7f00000000c0)='GPL\x00', 0x1, 0x91, &(0x7f0000000100)=""/145, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1324.152650][ T4810] BPF: [ 1324.166956][ T4808] BPF: [ 1324.166956][ T4808] [ 1324.172578][ T4810] BPF:Invalid return type [ 1324.185678][ T4810] BPF: [ 1324.185678][ T4810] 06:52:02 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:52:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x8, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1324.209907][ T4830] BPF:[1] FUNC_PROTO (anon) [ 1324.229876][ T4830] BPF:return=150994944 args=( [ 1324.232480][ T4831] BPF:[1] FUNC_PROTO (anon) [ 1324.253150][ T4830] BPF:0 (anon) [ 1324.264217][ T4831] BPF:return=2046820352 args=( [ 1324.274009][ T4830] BPF:, 0 (anon) [ 1324.285632][ T4831] BPF:0 (anon) [ 1324.291473][ T4830] BPF:, 3 (invalid-name-offset) [ 1324.298684][ T4831] BPF:, vararg 06:52:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect(r0, &(0x7f0000000600)=@nl=@proc={0x10, 0x0, 0x0, 0x2000000}, 0x80) 06:52:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1324.313155][ T4831] BPF:) [ 1324.325687][ T4830] BPF:) [ 1324.329150][ T4831] BPF: [ 1324.337977][ T4830] BPF: [ 1324.344880][ T4831] BPF:Invalid return type [ 1324.345419][ T4830] BPF:Invalid return type [ 1324.358773][ T4831] BPF: [ 1324.358773][ T4831] [ 1324.360949][ T4830] BPF: [ 1324.360949][ T4830] 06:52:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xa0000000, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 06:52:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:02 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c0000000214010000000000000000000900", @ANYRES32], 0x4c}}, 0x0) 06:52:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xa000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:02 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="1000000011140105"], 0x10}}, 0x0) 06:52:02 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x1410, 0x1}, 0x10}}, 0x0) [ 1324.456154][ T4855] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1324.458021][ T4856] BPF:[1] FUNC_PROTO (anon) [ 1324.479216][ T4857] BPF:[1] FUNC_PROTO (anon) [ 1324.492474][ T4857] BPF:return=2684354560 args=( [ 1324.497756][ T4857] BPF:0 (anon) 06:52:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0x0) syz_open_procfs$namespace(0x0, 0x0) setreuid(0x0, 0xee00) getresgid(&(0x7f0000004b40), 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1324.501971][ T4856] BPF:return=167772160 args=( [ 1324.508734][ T4857] BPF:, vararg [ 1324.512375][ T4856] BPF:0 (anon) [ 1324.516277][ T4857] BPF:) [ 1324.519327][ T4856] BPF:, 0 (anon) [ 1324.523061][ T4857] BPF: [ 1324.528608][ T4856] BPF:, 3 (invalid-name-offset) [ 1324.533912][ T4857] BPF:Invalid return type [ 1324.538958][ T4857] BPF: [ 1324.538958][ T4857] [ 1324.545100][ T4856] BPF:) [ 1324.553121][ T4856] BPF: 06:52:02 executing program 0: io_setup(0x1ff, &(0x7f0000000140)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) 06:52:02 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40049409, 0x7) [ 1324.560353][ T4856] BPF:Invalid return type [ 1324.566022][ T4863] BPF:[1] FUNC_PROTO (anon) [ 1324.573253][ T4856] BPF: [ 1324.573253][ T4856] [ 1324.593420][ T4863] BPF:return=2684354560 args=( [ 1324.601755][ T4863] BPF:0 (anon) 06:52:02 executing program 3: timer_create(0x0, 0x0, &(0x7f0000001340)) timer_gettime(0x0, &(0x7f0000001380)) 06:52:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1324.610054][ T4863] BPF:, vararg [ 1324.614014][ T4869] BPF:[1] FUNC_PROTO (anon) [ 1324.623571][ T4863] BPF:) [ 1324.629174][ T4863] BPF: [ 1324.641413][ T4863] BPF:Invalid return type [ 1324.649712][ T4869] BPF:return=167772160 args=( [ 1324.657566][ T4863] BPF: [ 1324.657566][ T4863] [ 1324.663318][ T4869] BPF:0 (anon) [ 1324.670645][ T4869] BPF:, 0 (anon) [ 1324.678917][ T4869] BPF:, 3 (invalid-name-offset) 06:52:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0xffff0f00, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:02 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x1, &(0x7f0000000000)=@raw=[@generic={0x1}], &(0x7f0000000240)='syzkaller\x00', 0x6, 0xaf, &(0x7f0000000280)=""/175, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:52:02 executing program 3: r0 = socket(0x2, 0x3, 0x7) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r0, &(0x7f00000003c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={0x0}}, 0x0) 06:52:02 executing program 0: shmget(0x2, 0xf000, 0x0, &(0x7f0000ff1000/0xf000)=nil) [ 1324.702591][ T4869] BPF:) [ 1324.710981][ T4869] BPF: [ 1324.725742][ T4869] BPF:Invalid return type [ 1324.753834][ T4869] BPF: [ 1324.753834][ T4869] 06:52:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xb000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:02 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 06:52:02 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000300)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 06:52:02 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x2, &(0x7f00000001c0)=@framed={{}, [@btf_id]}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0xaf, &(0x7f0000000280)=""/175, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:52:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1324.785501][ T4884] BPF:[1] FUNC_PROTO (anon) [ 1324.804410][ T4884] BPF:return=4294905600 args=( [ 1324.824355][ T4884] BPF:0 (anon) [ 1324.828041][ T4884] BPF:, vararg [ 1324.849784][ T4884] BPF:) [ 1324.859787][ T4884] BPF: [ 1324.871364][ T4884] BPF:Invalid return type [ 1324.891196][ T4884] BPF: [ 1324.891196][ T4884] 06:52:02 executing program 0: perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1324.891777][ T4898] BPF:[1] FUNC_PROTO (anon) 06:52:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000002d0001002cbd7000fcdbdf2500000000", @ANYRES32], 0x2c}}, 0x0) 06:52:02 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0xfffffffffffffff5, r1}, 0x18) [ 1324.926356][ T4898] BPF:return=184549376 args=( [ 1324.943045][ T4898] BPF:0 (anon) [ 1324.952699][ T4899] BPF:[1] FUNC_PROTO (anon) [ 1324.954179][ T4898] BPF:, 0 (anon) [ 1324.963091][ T4899] BPF:return=4294905600 args=( [ 1324.974019][ T4904] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1324.999754][ T4899] BPF:0 (anon) [ 1325.013264][ T4898] BPF:, 3 (invalid-name-offset) [ 1325.016033][ T4899] BPF:, vararg [ 1325.036574][ T4898] BPF:) [ 1325.040658][ T4899] BPF:) [ 1325.052844][ T4899] BPF: [ 1325.054217][ T4898] BPF: [ 1325.062881][ T4899] BPF:Invalid return type [ 1325.067017][ T4898] BPF:Invalid return type 06:52:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:02 executing program 3: clock_gettime(0x9e9c1b27f0d84206, 0x0) 06:52:02 executing program 0: io_setup(0x3, &(0x7f0000000100)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, 0x0, 0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:52:02 executing program 5: perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1325.086079][ T4898] BPF: [ 1325.086079][ T4898] [ 1325.087874][ T4899] BPF: [ 1325.087874][ T4899] [ 1325.111256][ T4909] BPF:[1] FUNC_PROTO (anon) [ 1325.121349][ T4909] BPF:return=184549376 args=( [ 1325.141978][ T4909] BPF:0 (anon) [ 1325.147839][ T4909] BPF:, 0 (anon) [ 1325.158274][ T4909] BPF:, 3 (invalid-name-offset) [ 1325.170400][ T4909] BPF:) [ 1325.177000][ T4909] BPF: [ 1325.180380][ T4909] BPF:Invalid return type [ 1325.185117][ T4909] BPF: [ 1325.185117][ T4909] 06:52:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xc000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="7000000000010904000000000000000002000000240001801400018008000100e000000108000200ac1e00010c0002800500010000000000240002801400018008000100ac1414aa08000200ac1e00010c000280050001000000000008000740000000000c00058008000100"], 0x70}}, 0x0) 06:52:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:03 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) [ 1325.187487][ T4923] BPF:[1] FUNC_PROTO (anon) [ 1325.200494][ T4923] BPF:return=0 args=( [ 1325.215246][ T4923] BPF:0 (anon) [ 1325.220217][ T4923] BPF:, vararg [ 1325.235936][ T4923] BPF:) 06:52:03 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="180000001114030829bd7000fddbdf2508003e"], 0x18}}, 0x0) [ 1325.243536][ T4923] BPF: [ 1325.250087][ T4923] BPF:Invalid arg#1 [ 1325.272324][ T4923] BPF: [ 1325.272324][ T4923] 06:52:03 executing program 5: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000240)) 06:52:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000440)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 1325.289622][ T4937] BPF:[1] FUNC_PROTO (anon) [ 1325.304508][ T4939] BPF:[1] FUNC_PROTO (anon) [ 1325.311584][ T4937] BPF:return=201326592 args=( [ 1325.331994][ T4939] BPF:return=0 args=( [ 1325.336613][ T4939] BPF:0 (anon) [ 1325.340062][ T4937] BPF:0 (anon) 06:52:03 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) [ 1325.351329][ T4939] BPF:, vararg [ 1325.355598][ T4937] BPF:, 0 (anon) [ 1325.362130][ T4939] BPF:) [ 1325.365197][ T4937] BPF:, 3 (invalid-name-offset) [ 1325.378156][ T4939] BPF: [ 1325.383508][ T4937] BPF:) [ 1325.391000][ T4939] BPF:Invalid arg#1 [ 1325.397757][ T4937] BPF: [ 1325.431690][ T4939] BPF: [ 1325.431690][ T4939] [ 1325.443124][ T4937] BPF:Invalid return type [ 1325.467929][ T4937] BPF: [ 1325.467929][ T4937] 06:52:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x2}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, 0x0, 0x404, 0x1}, 0x40) 06:52:03 executing program 5: io_setup(0x4, &(0x7f00000000c0)=0x0) io_submit(r0, 0x1, &(0x7f0000000340)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) io_submit(r0, 0x1, &(0x7f0000000200)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 06:52:03 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x9, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1325.493664][ T4952] BPF:[1] FUNC_PROTO (anon) [ 1325.510220][ T4952] BPF:return=201326592 args=( [ 1325.523910][ T4952] BPF:0 (anon) [ 1325.531517][ T4952] BPF:, 0 (anon) [ 1325.550766][ T4952] BPF:, 3 (invalid-name-offset) [ 1325.572006][ T4964] BPF:[1] FUNC_PROTO (anon) [ 1325.573250][ T4952] BPF:) [ 1325.587340][ T4952] BPF: [ 1325.599087][ T4952] BPF:Invalid return type [ 1325.601960][ T4964] BPF:return=0 args=( [ 1325.603732][ T4952] BPF: [ 1325.603732][ T4952] 06:52:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xd000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:03 executing program 1: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='x', 0x1, 0xfffffffffffffffe) 06:52:03 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_BMAP(r0, &(0x7f0000000000)={0xf}, 0x18) 06:52:03 executing program 3: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0xea60}) 06:52:03 executing program 5: utimensat(0xffffffffffffff9c, 0x0, 0x0, 0x55b4ea5cfc786d62) [ 1325.625314][ T4964] BPF:0 (invalid-name-offset) [ 1325.635817][ T4964] BPF:, vararg [ 1325.656014][ T4964] BPF:) [ 1325.661614][ T4964] BPF: [ 1325.669514][ T4964] BPF:Invalid arg#1 [ 1325.682603][ T4964] BPF: [ 1325.682603][ T4964] 06:52:03 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000001500)={@mcast1, @dev, @empty, 0x0, 0x401, 0x0, 0x0, 0x0, 0x1000220}) 06:52:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, 0x0, 0x0) [ 1325.712295][ T4978] BPF:[1] FUNC_PROTO (anon) [ 1325.717975][ T4975] BPF:[1] FUNC_PROTO (anon) [ 1325.737937][ T4975] BPF:return=218103808 args=( [ 1325.739021][ T4978] BPF:return=0 args=( [ 1325.751399][ T4975] BPF:0 (anon) [ 1325.764502][ T4975] BPF:, 0 (anon) [ 1325.773383][ T4978] BPF:0 (invalid-name-offset) [ 1325.778716][ T4975] BPF:, 3 (invalid-name-offset) [ 1325.787465][ T4978] BPF:, vararg [ 1325.794757][ T4975] BPF:) [ 1325.803568][ T4978] BPF:) [ 1325.805629][ T4975] BPF: [ 1325.815483][ T4975] BPF:Invalid return type [ 1325.825955][ T4975] BPF: [ 1325.825955][ T4975] [ 1325.832659][ T4978] BPF: [ 1325.840839][ T4978] BPF:Invalid arg#1 [ 1325.845221][ T4978] BPF: [ 1325.845221][ T4978] [ 1325.862283][ T4975] BPF:[1] FUNC_PROTO (anon) [ 1325.867913][ T4975] BPF:return=218103808 args=( [ 1325.898059][ T4975] BPF:0 (anon) [ 1325.910119][ T4975] BPF:, 0 (anon) 06:52:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:03 executing program 1: io_setup(0xfffffffc, &(0x7f0000000280)) 06:52:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:52:03 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_BMAP(r0, &(0x7f0000000000)={0x18, 0xc, r1}, 0x18) [ 1325.914703][ T4975] BPF:, 3 (invalid-name-offset) [ 1325.931127][ T4975] BPF:) [ 1325.933991][ T4975] BPF: [ 1325.943428][ T4975] BPF:Invalid return type [ 1325.957011][ T4975] BPF: [ 1325.957011][ T4975] 06:52:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xe000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:03 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000000414c1"], 0x20}}, 0x0) 06:52:03 executing program 0: add_key$user(&(0x7f0000000080)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000140)='}', 0x1, 0xfffffffffffffffd) 06:52:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) [ 1326.004186][ T4999] BPF:[1] FUNC_PROTO (anon) [ 1326.016590][ T4999] BPF:return=0 args=( [ 1326.040159][ T4999] BPF:0 (invalid-name-offset) [ 1326.054250][ T5004] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1326.068465][ T4999] BPF:, vararg [ 1326.083241][ T4999] BPF:) [ 1326.097921][ T4999] BPF: 06:52:03 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x64}]}) 06:52:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcsa\x00', 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r0, 0x0, 0x0) r1 = getpgid(0x0) syz_open_procfs$namespace(r1, 0x0) read$FUSE(r0, &(0x7f0000002a00)={0x2020}, 0x2020) getresuid(&(0x7f0000000000), &(0x7f0000000040), 0x0) setreuid(0x0, 0xee00) socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs$namespace(0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000004c00)='/dev/fuse\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 06:52:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000004c00)='/dev/fuse\x00', 0x2, 0x0) [ 1326.109141][ T4999] BPF:Invalid arg#1 [ 1326.113278][ T5011] BPF:[1] FUNC_PROTO (anon) [ 1326.127470][ T4999] BPF: [ 1326.127470][ T4999] [ 1326.135069][ T5011] BPF:return=234881024 args=( [ 1326.158635][ T5011] BPF:0 (anon) [ 1326.179583][ T5014] BPF:[1] FUNC_PROTO (anon) [ 1326.188890][ T5011] BPF:, 0 (anon) [ 1326.205763][ T5014] BPF:return=0 args=( [ 1326.211144][ T5011] BPF:, 3 (invalid-name-offset) [ 1326.226813][ T5014] BPF:0 (invalid-name-offset) [ 1326.237965][ T5011] BPF:) [ 1326.237975][ T5011] BPF: [ 1326.237981][ T5011] BPF:Invalid return type [ 1326.237987][ T5011] BPF: [ 1326.237987][ T5011] [ 1326.245402][ T5020] BPF:[1] FUNC_PROTO (anon) [ 1326.267617][ T5014] BPF:, vararg [ 1326.275245][ T5014] BPF:) [ 1326.281002][ T5014] BPF: [ 1326.283881][ T5020] BPF:return=234881024 args=( [ 1326.289383][ T5014] BPF:Invalid arg#1 [ 1326.293429][ T5014] BPF: [ 1326.293429][ T5014] [ 1326.301642][ T5020] BPF:0 (anon) [ 1326.305188][ T5020] BPF:, 0 (anon) 06:52:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:04 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000b00)={'batadv_slave_1\x00'}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={@empty, 0x0, r2}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8936, &(0x7f0000000000)={@rand_addr=' \x01\x00', 0x4f, r2}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='x', 0x1, 0xfffffffffffffffe) 06:52:04 executing program 1: setregid(0x0, 0xee01) setreuid(0x0, 0xee00) statx(0xffffffffffffff9c, &(0x7f0000006a40)='./file0\x00', 0x0, 0x0, 0x0) 06:52:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xf000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcsa\x00', 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r0, 0x0, 0x0) r1 = getpgid(0x0) syz_open_procfs$namespace(r1, 0x0) read$FUSE(r0, &(0x7f0000002a00)={0x2020}, 0x2020) getresuid(&(0x7f0000000000), &(0x7f0000000040), 0x0) setreuid(0x0, 0xee00) socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs$namespace(0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000004c00)='/dev/fuse\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) [ 1326.315901][ T5020] BPF:, 3 (invalid-name-offset) [ 1326.330245][ T5020] BPF:) [ 1326.333095][ T5020] BPF: [ 1326.335934][ T5020] BPF:Invalid return type [ 1326.344267][ T5020] BPF: [ 1326.344267][ T5020] 06:52:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:04 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x7}, 0x0) [ 1326.421306][ T5032] BPF:[1] FUNC_PROTO (anon) 06:52:04 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@private1, 0x0, r2}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x402600, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x4, 0x81, 0x2, 0x7, 0x8, @dev={0xfe, 0x80, [], 0x1e}, @remote, 0x6, 0x8, 0x4, 0x3}}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000180)={r4, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) [ 1326.450229][ T5032] BPF:return=0 args=( [ 1326.467079][ T5032] BPF:0 (invalid-name-offset) [ 1326.485485][ T5040] BPF:[1] FUNC_PROTO (anon) [ 1326.496026][ T5032] BPF:, vararg 06:52:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcsa\x00', 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r0, 0x0, 0x0) r1 = getpgid(0x0) syz_open_procfs$namespace(r1, 0x0) read$FUSE(r0, &(0x7f0000002a00)={0x2020}, 0x2020) getresuid(&(0x7f0000000000), &(0x7f0000000040), 0x0) setreuid(0x0, 0xee00) socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs$namespace(0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000004c00)='/dev/fuse\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 06:52:04 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x20, 0x1411, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_STAT_MODE={0x8}, @RDMA_NLDEV_ATTR_STAT_RES={0x8, 0x4b, 0x13}]}, 0x20}}, 0x0) 06:52:04 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffffff1f}, 0x0) [ 1326.507557][ T5040] BPF:return=251658240 args=( [ 1326.514886][ T5032] BPF:) [ 1326.530712][ T5032] BPF: [ 1326.537300][ T5040] BPF:0 (anon) [ 1326.545164][ T5032] BPF:Invalid arg#1 [ 1326.574628][ T5040] BPF:, 0 (anon) [ 1326.582822][ T5032] BPF: [ 1326.582822][ T5032] [ 1326.592123][ T5040] BPF:, 3 (invalid-name-offset) [ 1326.601022][ T5040] BPF:) [ 1326.604768][ T5040] BPF: [ 1326.610343][ T5052] BPF:[1] FUNC_PROTO (anon) [ 1326.615441][ T5040] BPF:Invalid return type [ 1326.621455][ T5052] BPF:return=0 args=( [ 1326.625823][ T5040] BPF: [ 1326.625823][ T5040] [ 1326.633355][ T5052] BPF:0 (invalid-name-offset) [ 1326.641554][ T5052] BPF:, vararg [ 1326.653345][ T5052] BPF:) [ 1326.655506][ T5054] BPF:[1] FUNC_PROTO (anon) [ 1326.664024][ T5052] BPF: [ 1326.667731][ T5052] BPF:Invalid arg#1 06:52:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:04 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x140f, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8}]}, 0x18}}, 0x0) 06:52:04 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x9, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:52:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1326.675232][ T5054] BPF:return=251658240 args=( [ 1326.675245][ T5054] BPF:0 (anon) [ 1326.675253][ T5054] BPF:, 0 (anon) [ 1326.675262][ T5054] BPF:, 3 (invalid-name-offset) [ 1326.675269][ T5054] BPF:) [ 1326.675274][ T5054] BPF: [ 1326.675280][ T5054] BPF:Invalid return type [ 1326.684169][ T5052] BPF: [ 1326.684169][ T5052] [ 1326.692647][ T5054] BPF: [ 1326.692647][ T5054] 06:52:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x10000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcsa\x00', 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r0, 0x0, 0x0) r1 = getpgid(0x0) syz_open_procfs$namespace(r1, 0x0) read$FUSE(r0, &(0x7f0000002a00)={0x2020}, 0x2020) getresuid(&(0x7f0000000000), &(0x7f0000000040), 0x0) setreuid(0x0, 0xee00) socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs$namespace(0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000004c00)='/dev/fuse\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 06:52:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:04 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) 06:52:04 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x18, 0x4, &(0x7f0000000080)=@framed={{}, [@jmp]}, &(0x7f00000000c0)='GPL\x00', 0x7, 0xb2, &(0x7f0000000100)=""/178, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1326.810628][ T5065] BPF:[1] FUNC_PROTO (anon) [ 1326.819224][ T5065] BPF:return=0 args=( [ 1326.823466][ T5065] BPF:0 (invalid-name-offset) [ 1326.842990][ T5065] BPF:, vararg [ 1326.850690][ T5065] BPF:) 06:52:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 06:52:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xb5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1326.861855][ T5065] BPF: [ 1326.873299][ T5065] BPF:Invalid arg#1 [ 1326.890166][ T5065] BPF: [ 1326.890166][ T5065] [ 1326.899041][ T5077] BPF:[1] FUNC_PROTO (anon) [ 1326.905987][ T5077] BPF:return=268435456 args=( 06:52:04 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x74], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1326.927442][ T5077] BPF:0 (anon) [ 1326.932620][ T5080] BPF:[1] FUNC_PROTO (anon) [ 1326.951342][ T5077] BPF:, 0 (anon) [ 1326.957473][ T5080] BPF:return=0 args=( [ 1326.969091][ T5077] BPF:, 3 (invalid-name-offset) [ 1326.982582][ T5080] BPF:0 (invalid-name-offset) [ 1326.990282][ T5077] BPF:) [ 1326.997210][ T5077] BPF: [ 1327.001285][ T5080] BPF:, vararg [ 1327.007467][ T5077] BPF:Invalid return type [ 1327.013550][ T5080] BPF:) [ 1327.022490][ T5080] BPF: [ 1327.025425][ T5077] BPF: [ 1327.025425][ T5077] 06:52:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x6}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:04 executing program 5: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000040)=""/92) r0 = shmget(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000fff000/0x1000)=nil, 0x5000) 06:52:04 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x0, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0xff, 0x5, 0x1, 0x4}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4, r5}) 06:52:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1327.031290][ T5080] BPF:Invalid arg#1 [ 1327.035371][ T5080] BPF: [ 1327.035371][ T5080] [ 1327.048261][ T5086] BPF:[1] FUNC_PROTO (anon) [ 1327.057865][ T5086] BPF:return=268435456 args=( [ 1327.065550][ T5086] BPF:0 (anon) [ 1327.084825][ T5086] BPF:, 0 (anon) [ 1327.094024][ T5086] BPF:, 3 (invalid-name-offset) [ 1327.108311][ T5086] BPF:) [ 1327.112247][ T5096] BPF:[1] FUNC_PROTO (anon) [ 1327.122353][ T5086] BPF: [ 1327.127216][ T5096] BPF:return=0 args=( [ 1327.138842][ T5086] BPF:Invalid return type [ 1327.147081][ T5096] BPF:0 (invalid-name-offset) [ 1327.155422][ T5086] BPF: [ 1327.155422][ T5086] 06:52:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x11000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:05 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000640)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 06:52:05 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2401, 0x0) 06:52:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x5, 0x6c}]}]}}, &(0x7f0000000440)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 06:52:05 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x5, &(0x7f00000001c0)=@framed={{}, [@btf_id]}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0xaf, &(0x7f0000000280)=""/175, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1327.179694][ T5096] BPF:, vararg [ 1327.183103][ T5096] BPF:) [ 1327.185860][ T5096] BPF: [ 1327.199027][ T5096] BPF:Invalid arg#1 [ 1327.206522][ T5096] BPF: [ 1327.206522][ T5096] [ 1327.227058][ T5102] BPF:[1] FUNC_PROTO (anon) [ 1327.238199][ T5102] BPF:return=0 args=( [ 1327.242200][ T5102] BPF:0 (invalid-name-offset) 06:52:05 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x4, &(0x7f00000001c0)=@framed={{}, [@generic={0x50}]}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0xaf, &(0x7f0000000280)=""/175, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:52:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:05 executing program 3: socket(0x2, 0x3, 0x7) [ 1327.290276][ T3010] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1327.296730][ T24] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1327.302254][ T5102] BPF:, vararg [ 1327.315311][ T5113] BPF:[1] FUNC_PROTO (anon) [ 1327.334801][ T5113] BPF:return=285212672 args=( [ 1327.358551][ T5113] BPF:0 (anon) [ 1327.361375][ T5102] BPF:) [ 1327.373669][ T5113] BPF:, 0 (anon) [ 1327.376136][ T5102] BPF: [ 1327.381994][ T5113] BPF:, 3 (invalid-name-offset) [ 1327.383788][ T5102] BPF:Invalid arg#1 [ 1327.392193][ T5113] BPF:) [ 1327.399979][ T5113] BPF: [ 1327.404943][ T5102] BPF: [ 1327.404943][ T5102] [ 1327.408833][ T5113] BPF:Invalid return type [ 1327.432860][ T5113] BPF: [ 1327.432860][ T5113] 06:52:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x8, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:05 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 06:52:05 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="100000000f2db9"], 0x10}}, 0x0) [ 1327.463592][ T5120] BPF:[1] FUNC_PROTO (anon) [ 1327.472121][ T5120] BPF:return=285212672 args=( [ 1327.484185][ T5120] BPF:0 (anon) [ 1327.491967][ T5120] BPF:, 0 (anon) [ 1327.500802][ T5120] BPF:, 3 (invalid-name-offset) [ 1327.524760][ T5120] BPF:) [ 1327.539548][ T5120] BPF: [ 1327.550654][ T5120] BPF:Invalid return type [ 1327.555039][ T5120] BPF: [ 1327.555039][ T5120] [ 1327.563366][ T5129] BPF:[1] FUNC_PROTO (anon) [ 1327.568712][ T5129] BPF:return=0 args=( 06:52:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x12000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:05 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x11d043, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f0000000240)='\x00', 0x1000, 0x0, &(0x7f00000000c0)) 06:52:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) write$tcp_congestion(r0, &(0x7f00000000c0)='reno\x00', 0x5) 06:52:05 executing program 1: bpf$MAP_CREATE(0x14, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 06:52:05 executing program 5: setreuid(0x0, 0xee00) r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) [ 1327.572858][ T5129] BPF:0 (invalid-name-offset) [ 1327.591876][ T5129] BPF:, vararg [ 1327.596325][ T5129] BPF:) [ 1327.601657][ T5129] BPF: [ 1327.604428][ T5129] BPF:Invalid arg#1 [ 1327.619033][ T5129] BPF: [ 1327.619033][ T5129] [ 1327.648037][ T5140] BPF:[1] FUNC_PROTO (anon) 06:52:05 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$sock_linger(r2, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r2, &(0x7f0000004540)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2f249c910ccab00220bc31", 0x34}, {&(0x7f00000011c0)='|', 0x1}], 0x2, 0x0, 0x0, 0xffffffe0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x4000000) 06:52:05 executing program 1: timer_create(0x3, 0x0, &(0x7f0000001340)) timer_gettime(0x0, &(0x7f0000001380)) 06:52:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x4, &(0x7f00000001c0)=@framed={{}, [@alu={0x4}]}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0xaf, &(0x7f0000000280)=""/175, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1327.669904][ T5140] BPF:return=0 args=( [ 1327.674468][ T5143] BPF:[1] FUNC_PROTO (anon) [ 1327.690510][ T5140] BPF:0 (invalid-name-offset) [ 1327.702299][ T5143] BPF:return=301989888 args=( [ 1327.720439][ T5140] BPF:, vararg [ 1327.724443][ T5143] BPF:0 (anon) [ 1327.734451][ T5140] BPF:) [ 1327.736364][ T5143] BPF:, 0 (anon) [ 1327.751709][ T5143] BPF:, 3 (invalid-name-offset) [ 1327.753009][ T5140] BPF: [ 1327.766425][ T5140] BPF:Invalid arg#1 [ 1327.770970][ T5143] BPF:) [ 1327.786098][ T5143] BPF: [ 1327.786147][ T5140] BPF: [ 1327.786147][ T5140] [ 1327.803701][ T5143] BPF:Invalid return type 06:52:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x8}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00', 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}]}, 0x28}}, 0x0) 06:52:05 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$sock_linger(r2, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r2, &(0x7f0000004540)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2f249c910ccab00220bc31", 0x34}, {&(0x7f00000011c0)='|', 0x1}], 0x2, 0x0, 0x0, 0xffffffe0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x4000000) [ 1327.826666][ T5143] BPF: [ 1327.826666][ T5143] [ 1327.874624][ T5162] BPF:[1] FUNC_PROTO (anon) [ 1327.895320][ T5164] BPF:[1] FUNC_PROTO (anon) [ 1327.899759][ T5162] BPF:return=301989888 args=( [ 1327.919833][ T5164] BPF:return=0 args=( [ 1327.924059][ T5164] BPF:0 (invalid-name-offset) [ 1327.924408][ T5162] BPF:0 (anon) [ 1327.932276][ T5164] BPF:, vararg [ 1327.936039][ T5164] BPF:) [ 1327.940062][ T5164] BPF: [ 1327.943362][ T5164] BPF:Invalid arg#1 [ 1327.949621][ T5164] BPF: [ 1327.949621][ T5164] [ 1327.954935][ T5162] BPF:, 0 (anon) [ 1327.965906][ T5162] BPF:, 3 (invalid-name-offset) [ 1327.973543][ T5162] BPF:) [ 1327.976450][ T5162] BPF: [ 1327.976886][ T5166] BPF:[1] FUNC_PROTO (anon) [ 1327.981388][ T5162] BPF:Invalid return type [ 1327.983823][ T5166] BPF:return=0 args=( 06:52:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x20000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f00000000c0)=0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000000300)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 06:52:05 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$sock_linger(r2, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r2, &(0x7f0000004540)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2f249c910ccab00220bc31", 0x34}, {&(0x7f00000011c0)='|', 0x1}], 0x2, 0x0, 0x0, 0xffffffe0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x4000000) 06:52:05 executing program 3: socketpair(0xa, 0x3, 0x6, &(0x7f0000004a00)) [ 1327.983835][ T5166] BPF:0 (invalid-name-offset) [ 1327.983842][ T5166] BPF:, vararg [ 1327.993285][ T5162] BPF: [ 1327.993285][ T5162] [ 1328.016819][ T5166] BPF:) [ 1328.019609][ T5166] BPF: [ 1328.022363][ T5166] BPF:Invalid arg#1 [ 1328.026157][ T5166] BPF: [ 1328.026157][ T5166] 06:52:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x9}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1328.085985][ T5178] BPF:[1] FUNC_PROTO (anon) 06:52:05 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$sock_linger(r2, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r2, &(0x7f0000004540)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f0000000fc0)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2f249c910ccab00220bc31", 0x34}, {&(0x7f00000011c0)='|', 0x1}], 0x2, 0x0, 0x0, 0xffffffe0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x4000000) [ 1328.117482][ T5181] BPF:[1] FUNC_PROTO (anon) [ 1328.118711][ T5178] BPF:return=536870912 args=( [ 1328.122486][ T5181] BPF:return=0 args=( [ 1328.134592][ T5181] BPF:0 (invalid-name-offset) [ 1328.140851][ T5181] BPF:, vararg [ 1328.144531][ T5181] BPF:) [ 1328.151115][ T5181] BPF: [ 1328.155051][ T5181] BPF:Invalid arg#1 06:52:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:05 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40082404, 0x0) [ 1328.168067][ T5178] BPF:0 (anon) [ 1328.177411][ T5178] BPF:, 0 (anon) [ 1328.186986][ T5181] BPF: [ 1328.186986][ T5181] [ 1328.195573][ T5178] BPF:, 3 (invalid-name-offset) [ 1328.214667][ T5178] BPF:) 06:52:06 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, 0x0, 0x0) [ 1328.220479][ T5185] BPF:[1] FUNC_PROTO (anon) [ 1328.236373][ T5185] BPF:return=0 args=( [ 1328.236716][ T5178] BPF: [ 1328.244815][ T5185] BPF:0 (invalid-name-offset) [ 1328.255985][ T5185] BPF:, vararg [ 1328.258956][ T5178] BPF:Invalid return type 06:52:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000440)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 06:52:06 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x8, 0x1}, 0x0, 0x0, r0, 0x0) [ 1328.269574][ T5185] BPF:) [ 1328.284089][ T5185] BPF: [ 1328.287326][ T5178] BPF: [ 1328.287326][ T5178] [ 1328.292614][ T5185] BPF:Invalid arg#1 [ 1328.321198][ T5185] BPF: [ 1328.321198][ T5185] [ 1328.332400][ T5178] BPF:[1] FUNC_PROTO (anon) [ 1328.338415][ T5178] BPF:return=536870912 args=( 06:52:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x25000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000029c0)='./file0\x00', 0x250000, 0x0) r0 = getpgid(0x0) syz_open_procfs$namespace(r0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002a00)={0x2020}, 0x2020) getresuid(0x0, 0x0, 0x0) 06:52:06 executing program 1: select(0x9b, &(0x7f0000000100), &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x0, 0x3}, &(0x7f00000000c0)) 06:52:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xa}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:06 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000002300)='/dev/vcsa\x00', 0x20a02, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000002340)={0x20}, 0x20) read$FUSE(r0, &(0x7f0000002380)={0x2020}, 0x2020) 06:52:06 executing program 5: io_setup(0x8000fffe, &(0x7f0000000040)) [ 1328.371830][ T5178] BPF:0 (anon) [ 1328.380228][ T5178] BPF:, 0 (anon) [ 1328.394837][ T5178] BPF:, 3 (invalid-name-offset) [ 1328.400718][ T5178] BPF:) [ 1328.403552][ T5178] BPF: [ 1328.406358][ T5178] BPF:Invalid return type [ 1328.413170][ T5178] BPF: [ 1328.413170][ T5178] [ 1328.488051][ T5207] BPF:[1] FUNC_PROTO (anon) [ 1328.505715][ T5207] BPF:return=0 args=( [ 1328.508429][ T5214] BPF:[1] FUNC_PROTO (anon) [ 1328.525644][ T5207] BPF:0 (invalid-name-offset) 06:52:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1328.536432][ T5214] BPF:return=620756992 args=( 06:52:06 executing program 1: syz_emit_ethernet(0xc2, &(0x7f0000000100)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "d232c3", 0x8c, 0x2f, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', {[@srh={0x2e, 0x8, 0x4, 0x4, 0x0, 0x0, 0x0, [@mcast1, @mcast2, @mcast1, @mcast1]}]}}}}}, 0x0) 06:52:06 executing program 0: select(0x700, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0xea60}) 06:52:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1328.560017][ T5214] BPF:0 (anon) [ 1328.566384][ T5214] BPF:, 0 (anon) [ 1328.571720][ T5207] BPF:, vararg [ 1328.588245][ T5214] BPF:, 3 (invalid-name-offset) [ 1328.598362][ T5207] BPF:) [ 1328.604294][ T5214] BPF:) 06:52:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1328.610542][ T5207] BPF: [ 1328.614995][ T5214] BPF: [ 1328.623069][ T5207] BPF:Invalid arg#1 [ 1328.624581][ T5214] BPF:Invalid return type [ 1328.639453][ T5214] BPF: [ 1328.639453][ T5214] [ 1328.645755][ T5207] BPF: [ 1328.645755][ T5207] 06:52:06 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x80082407, 0x0) [ 1328.665093][ T5225] BPF:[1] FUNC_PROTO (anon) [ 1328.676374][ T5225] BPF:return=620756992 args=( [ 1328.689190][ T5227] BPF:[1] FUNC_PROTO (anon) [ 1328.696405][ T5225] BPF:0 (anon) [ 1328.705241][ T5227] BPF:return=0 args=( [ 1328.710636][ T5225] BPF:, 0 (anon) [ 1328.722773][ T5227] BPF:0 (invalid-name-offset) [ 1328.729077][ T5225] BPF:, 3 (invalid-name-offset) [ 1328.751795][ T5227] BPF:, vararg [ 1328.759959][ T5227] BPF:) [ 1328.763524][ T5227] BPF: 06:52:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x26000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:06 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c0000000214010000000000000000000900020073797a30000000000500", @ANYRES32], 0x4c}}, 0x0) 06:52:06 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x4, &(0x7f00000001c0)=@framed={{}, [@alu={0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0xaf, &(0x7f0000000280)=""/175, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:52:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xb}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1328.773217][ T5225] BPF:) [ 1328.774751][ T5227] BPF:Invalid arg#1 [ 1328.783031][ T5227] BPF: [ 1328.783031][ T5227] [ 1328.784806][ T5225] BPF: [ 1328.794489][ T5225] BPF:Invalid return type [ 1328.802942][ T5225] BPF: [ 1328.802942][ T5225] 06:52:06 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x9, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x3, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:52:06 executing program 3: syz_open_procfs$userns(0x0, &(0x7f0000000400)='ns/user\x00') syz_open_procfs$userns(0x0, &(0x7f0000000480)='ns/user\x00') [ 1328.887704][ T5244] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1328.895122][ T5243] BPF:[1] FUNC_PROTO (anon) [ 1328.904412][ T5245] BPF:[1] FUNC_PROTO (anon) [ 1328.914945][ T5243] BPF:return=637534208 args=( [ 1328.916983][ T5245] BPF:return=0 args=( [ 1328.933083][ T5245] BPF:0 (invalid-name-offset) 06:52:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f00000000c0)) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:52:06 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) [ 1328.948729][ T5243] BPF:0 (anon) [ 1328.957330][ T5245] BPF:, vararg [ 1328.974875][ T5243] BPF:, 0 (anon) [ 1328.981930][ T5245] BPF:) [ 1328.988244][ T5243] BPF:, 3 (invalid-name-offset) 06:52:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1329.001008][ T5245] BPF: [ 1329.008226][ T5245] BPF:Invalid arg#1 [ 1329.012671][ T5243] BPF:) [ 1329.018696][ T5245] BPF: [ 1329.018696][ T5245] [ 1329.024874][ T5243] BPF: [ 1329.034937][ T5243] BPF:Invalid return type [ 1329.045465][ T5243] BPF: [ 1329.045465][ T5243] 06:52:06 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x19, 0x0, 0x0, 0x700}, 0x40) [ 1329.056462][ T5263] BPF:[1] FUNC_PROTO (anon) [ 1329.068529][ T5266] BPF:[1] FUNC_PROTO (anon) [ 1329.079353][ T5263] BPF:return=0 args=( [ 1329.081042][ T5266] BPF:return=637534208 args=( [ 1329.089262][ T5263] BPF:0 (invalid-name-offset) [ 1329.101411][ T5263] BPF:, vararg [ 1329.111599][ T5263] BPF:) [ 1329.119876][ T5266] BPF:0 (anon) [ 1329.123398][ T5266] BPF:, 0 (anon) [ 1329.123464][ T5263] BPF: [ 1329.128607][ T5266] BPF:, 3 (invalid-name-offset) [ 1329.134962][ T5266] BPF:) [ 1329.141047][ T5263] BPF:Invalid arg#1 [ 1329.147826][ T5266] BPF: 06:52:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x3f000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:07 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000280)={&(0x7f00000002c0), 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0xfffffffffffffe5e}, 0x10}}, 0x0) 06:52:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:07 executing program 1: clock_gettime(0x0, 0xfffffffffffffffd) 06:52:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xc}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:07 executing program 5: syz_emit_ethernet(0xda, &(0x7f0000000000)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "a9f344", 0xa4, 0x11, 0x0, @remote, @local, {[@dstopts], {0x0, 0x0, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "d9b73d4355434973341c2be604e6b228b1b7f2f21e77a9dfcd35a7191a14ebc5", "432659542058df5897f24d5a9388b0c2b126a8f2a686f472b8e91fb8a6155bc11f79f6ab7bff4c51c05b517872810026", "8d4bcd805e93a2c26fe829f9a467a75e65dbe80dd24cdb9ab354f113", {"6d62315b47bba3d70c8a290d347b7222", "617b5e1e2ec5e63dab0c0c661fb0db08"}}}}}}}}, 0x0) [ 1329.164417][ T5263] BPF: [ 1329.164417][ T5263] [ 1329.181958][ T5266] BPF:Invalid return type [ 1329.192631][ T5266] BPF: [ 1329.192631][ T5266] 06:52:07 executing program 1: io_setup(0x3, &(0x7f0000000100)=0x0) io_pgetevents(r0, 0x6, 0x6, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}], 0x0, 0x0) 06:52:07 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000006d40)='ns/mnt\x00') read$FUSE(r0, 0x0, 0x0) [ 1329.278396][ T5282] BPF:[1] FUNC_PROTO (anon) [ 1329.296149][ T5285] BPF:[1] FUNC_PROTO (anon) [ 1329.303807][ T5282] BPF:return=1056964608 args=( [ 1329.314203][ T5285] BPF:return=0 args=( 06:52:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000002d0001002cbd7000fcdbdf2500000000", @ANYRES32, @ANYRESDEC], 0x2c}}, 0x0) 06:52:07 executing program 5: socketpair(0x10, 0x2, 0x12, &(0x7f0000000180)) [ 1329.327192][ T5282] BPF:0 (anon) [ 1329.335979][ T5285] BPF:0 (invalid-name-offset) [ 1329.344188][ T5282] BPF:, 0 (anon) [ 1329.348701][ T5282] BPF:, 3 (invalid-name-offset) [ 1329.353827][ T5285] BPF:, vararg [ 1329.369494][ T5285] BPF:) [ 1329.374743][ T5282] BPF:) [ 1329.379823][ T5292] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1329.384300][ T5285] BPF: [ 1329.394598][ T5282] BPF: [ 1329.403702][ T5282] BPF:Invalid return type [ 1329.413069][ T5285] BPF:Invalid arg#1 [ 1329.424607][ T5285] BPF: [ 1329.424607][ T5285] 06:52:07 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0xf0}, 0x0) 06:52:07 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xf4240, &(0x7f00000001c0)=@framed={{}, [@btf_id]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0xaf, &(0x7f0000000280)=""/175, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1329.435292][ T5282] BPF: [ 1329.435292][ T5282] [ 1329.462835][ T5297] BPF:[1] FUNC_PROTO (anon) [ 1329.475827][ T5295] BPF:[1] FUNC_PROTO (anon) [ 1329.489337][ T5297] BPF:return=0 args=( [ 1329.495001][ T5295] BPF:return=1056964608 args=( [ 1329.509001][ T5297] BPF:0 (invalid-name-offset) [ 1329.519484][ T5295] BPF:0 (anon) [ 1329.531226][ T5297] BPF:, vararg [ 1329.534931][ T5295] BPF:, 0 (anon) [ 1329.542329][ T5295] BPF:, 3 (invalid-name-offset) [ 1329.544082][ T5297] BPF:) [ 1329.548210][ T5295] BPF:) [ 1329.552924][ T5295] BPF: [ 1329.555936][ T5295] BPF:Invalid return type [ 1329.559232][ T5297] BPF: 06:52:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x43000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x8, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:52:07 executing program 3: sendmsg$RDMA_NLDEV_CMD_RES_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280), 0xc, 0x0}, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5412, &(0x7f0000000100)) [ 1329.563640][ T5295] BPF: [ 1329.563640][ T5295] [ 1329.565416][ T5297] BPF:Invalid arg#1 [ 1329.577294][ T5297] BPF: [ 1329.577294][ T5297] 06:52:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xd}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1329.639924][ T5310] BPF:[1] FUNC_PROTO (anon) [ 1329.649582][ T5310] BPF:return=1124073472 args=( 06:52:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1329.680923][ T5310] BPF:0 (anon) [ 1329.691299][ T5310] BPF:, 0 (anon) [ 1329.701728][ T5315] BPF:[1] FUNC_PROTO (anon) [ 1329.709081][ T5310] BPF:, 3 (invalid-name-offset) [ 1329.722063][ T5315] BPF:return=0 args=( [ 1329.726395][ T5310] BPF:) [ 1329.729327][ T5310] BPF: [ 1329.732297][ T5315] BPF:0 (invalid-name-offset) [ 1329.738728][ T5310] BPF:Invalid return type [ 1329.743473][ T5315] BPF:, vararg [ 1329.747421][ T5310] BPF: [ 1329.747421][ T5310] [ 1329.753014][ T5315] BPF:) [ 1329.756000][ T5315] BPF: [ 1329.761076][ T5315] BPF:Invalid arg#1 [ 1329.766386][ T5315] BPF: [ 1329.766386][ T5315] [ 1329.773353][ T5318] BPF:[1] FUNC_PROTO (anon) [ 1329.780110][ T5318] BPF:return=1124073472 args=( [ 1329.793583][ T5318] BPF:0 (anon) [ 1329.797693][ T5320] BPF:[1] FUNC_PROTO (anon) [ 1329.803200][ T5318] BPF:, 0 (anon) [ 1329.809641][ T5320] BPF:return=0 args=( [ 1329.809950][ T5318] BPF:, 3 (invalid-name-offset) [ 1329.822239][ T5318] BPF:) [ 1329.826517][ T5318] BPF: [ 1329.826912][ T5320] BPF:0 (invalid-name-offset) [ 1329.829686][ T5318] BPF:Invalid return type [ 1329.836638][ T5320] BPF:, vararg [ 1329.840340][ T5318] BPF: [ 1329.840340][ T5318] [ 1329.846663][ T5320] BPF:) [ 1329.849433][ T5320] BPF: [ 1329.852282][ T5320] BPF:Invalid arg#1 [ 1329.856096][ T5320] BPF: [ 1329.856096][ T5320] 06:52:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x8, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:08 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x11d043, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x800, 0x0, &(0x7f0000000280)) 06:52:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socketpair(0x1, 0x2, 0x8001, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000000)={@empty, 0x0, r3}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000080)={'ip6tnl0\x00', r3, 0x29, 0x3, 0x1f, 0x7f, 0x20, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x40, 0x700, 0x9}}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a0, &(0x7f0000000040)={@private0={0xfc, 0x0, [], 0x1}, 0x66}) 06:52:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x48000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xe}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x9, 0x4, &(0x7f0000000200)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:52:08 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1411, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x8, 0x4b, 0x13}]}, 0x18}}, 0x0) [ 1330.331388][ T5339] BPF:[1] FUNC_PROTO (anon) [ 1330.345280][ T5340] BPF:[1] FUNC_PROTO (anon) [ 1330.348106][ T5339] BPF:return=0 args=( [ 1330.355683][ T5340] BPF:return=1207959552 args=( 06:52:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1330.378897][ T5339] BPF:0 (invalid-name-offset) [ 1330.394401][ T5340] BPF:0 (anon) [ 1330.409627][ T5339] BPF:, vararg [ 1330.417735][ T5340] BPF:, 0 (anon) [ 1330.423766][ T5339] BPF:) 06:52:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x9, 0x3, &(0x7f00000001c0)=@framed={{0x18, 0x6}}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1330.434599][ T5339] BPF: [ 1330.438765][ T5340] BPF:, 3 (invalid-name-offset) [ 1330.451128][ T5339] BPF:Invalid arg#1 [ 1330.459262][ T5340] BPF:) [ 1330.469372][ T5339] BPF: [ 1330.469372][ T5339] [ 1330.477165][ T5340] BPF: 06:52:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcsa\x00', 0x0, 0x0) getpgid(0x0) read$FUSE(r0, &(0x7f0000002a00)={0x2020}, 0x2020) syz_open_procfs$namespace(0x0, &(0x7f0000006d40)='ns/mnt\x00') openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005100), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 06:52:08 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c000000021401"], 0x4c}, 0x1, 0x0, 0x0, 0x20044000}, 0x40000) 06:52:08 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0xffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x1000}, {r0, 0x405}], 0x2, 0x0) close(r0) [ 1330.487562][ T5340] BPF:Invalid return type [ 1330.502710][ T5340] BPF: [ 1330.502710][ T5340] [ 1330.507282][ T5355] BPF:[1] FUNC_PROTO (anon) [ 1330.523705][ T5355] BPF:return=0 args=( [ 1330.542146][ T5355] BPF:0 (invalid-name-offset) [ 1330.553139][ T5360] BPF:[1] FUNC_PROTO (anon) [ 1330.563715][ T5355] BPF:, vararg [ 1330.573632][ T5360] BPF:return=1207959552 args=( [ 1330.583366][ T5355] BPF:) 06:52:08 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40082404, 0x0) 06:52:08 executing program 1: perf_event_open(&(0x7f0000003680)={0x7, 0x70, 0x0, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1330.594112][ T5367] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1330.606259][ T5355] BPF: [ 1330.617724][ T5360] BPF:0 (anon) [ 1330.626390][ T5355] BPF:Invalid arg#1 [ 1330.639039][ T5360] BPF:, 0 (anon) [ 1330.646428][ T5355] BPF: [ 1330.646428][ T5355] [ 1330.652424][ T5360] BPF:, 3 (invalid-name-offset) [ 1330.665501][ T5360] BPF:) [ 1330.677879][ T5360] BPF: [ 1330.685390][ T5360] BPF:Invalid return type [ 1330.721632][ T5360] BPF: [ 1330.721632][ T5360] 06:52:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x4c000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:08 executing program 5: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x4}, &(0x7f00000000c0)={0x7}, 0x0, 0x0) 06:52:08 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1411, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_STAT_RES={0xc}]}, 0x18}}, 0x0) 06:52:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xf}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0xffffffffffffffb4) 06:52:08 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x4, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x0, @perf_config_ext={0xfd9e, 0x8}, 0x100, 0x1000, 0x7, 0x5, 0x0, 0x8, 0x1}, 0x0, 0x0, r0, 0x0) [ 1330.843288][ T5387] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1330.843365][ T5385] BPF:[1] FUNC_PROTO (anon) 06:52:08 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x4, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 06:52:08 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:52:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x3, &(0x7f00000001c0)=@framed={{}, [@btf_id]}, &(0x7f0000000240)='syzkaller\x00', 0x6, 0xaf, &(0x7f0000000280)=""/175, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1330.887515][ T5389] BPF:[1] FUNC_PROTO (anon) [ 1330.892144][ T5389] BPF:return=1275068416 args=( [ 1330.921080][ T5389] BPF:0 (anon) [ 1330.927203][ T5385] BPF:return=0 args=( [ 1330.931385][ T5389] BPF:, 0 (anon) 06:52:08 executing program 1: mlockall(0x3) mlockall(0x3) [ 1330.940954][ T5385] BPF:0 (invalid-name-offset) [ 1330.943972][ T5389] BPF:, 3 (invalid-name-offset) [ 1330.961996][ T5385] BPF:, vararg [ 1330.972462][ T5389] BPF:) [ 1330.981841][ T5389] BPF: [ 1330.984896][ T5385] BPF:) 06:52:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x186a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1330.993592][ T5389] BPF:Invalid return type [ 1330.995009][ T5385] BPF: [ 1331.014375][ T5389] BPF: [ 1331.014375][ T5389] [ 1331.017076][ T5385] BPF:Invalid arg#1 [ 1331.030257][ T5385] BPF: [ 1331.030257][ T5385] [ 1331.062347][ T5402] BPF:[1] FUNC_PROTO (anon) [ 1331.075714][ T5402] BPF:return=1275068416 args=( [ 1331.086976][ T5404] BPF:[1] FUNC_PROTO (anon) [ 1331.091637][ T5404] BPF:return=0 args=( [ 1331.095617][ T5404] BPF:0 (invalid-name-offset) [ 1331.103209][ T5402] BPF:0 (anon) [ 1331.118983][ T5402] BPF:, 0 (anon) [ 1331.122596][ T5402] BPF:, 3 (invalid-name-offset) [ 1331.140346][ T5404] BPF:, vararg [ 1331.143750][ T5404] BPF:) [ 1331.147622][ T5402] BPF:) [ 1331.150420][ T5402] BPF: [ 1331.153301][ T5402] BPF:Invalid return type [ 1331.160059][ T5404] BPF: [ 1331.162852][ T5404] BPF:Invalid arg#1 [ 1331.186672][ T5404] BPF: [ 1331.186672][ T5404] [ 1331.203279][ T5402] BPF: [ 1331.203279][ T5402] 06:52:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x60000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:09 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005a00)=""/4119, 0x1017}, {&(0x7f00000029c0)=""/4066, 0xfe2}], 0x2}, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 06:52:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f00000000c0)) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) 06:52:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x10}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1331.318679][ T5415] BPF:[1] FUNC_PROTO (anon) [ 1331.326881][ T5416] netlink: 36939 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1331.349609][ T5415] BPF:return=0 args=( [ 1331.354680][ T5419] BPF:[1] FUNC_PROTO (anon) [ 1331.363025][ T5415] BPF:0 (invalid-name-offset) [ 1331.368762][ T5419] BPF:return=1610612736 args=( [ 1331.374805][ T5415] BPF:, vararg [ 1331.381238][ T5419] BPF:0 (anon) [ 1331.388637][ T5420] netlink: 36939 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1331.402386][ T5415] BPF:) [ 1331.405465][ T5419] BPF:, 0 (anon) [ 1331.409419][ T5415] BPF: [ 1331.412438][ T5419] BPF:, 3 (invalid-name-offset) 06:52:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22811, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x900}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1331.419194][ T5415] BPF:Invalid arg#1 [ 1331.425744][ T5419] BPF:) [ 1331.429439][ T5415] BPF: [ 1331.429439][ T5415] [ 1331.440244][ T5419] BPF: [ 1331.448701][ T5419] BPF:Invalid return type [ 1331.457763][ T5422] BPF:[1] FUNC_PROTO (anon) [ 1331.461538][ T5419] BPF: [ 1331.461538][ T5419] 06:52:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x2d}]}) 06:52:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x18, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x18}}, 0x0) [ 1331.474981][ T5422] BPF:return=0 args=( [ 1331.490539][ T5422] BPF:0 (invalid-name-offset) [ 1331.514655][ T5422] BPF:, vararg [ 1331.518832][ T5422] BPF:) [ 1331.521956][ T5422] BPF: 06:52:09 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1411, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x8, 0x54}]}, 0x18}}, 0x0) [ 1331.525106][ T5422] BPF:Invalid arg#1 [ 1331.531094][ T5422] BPF: [ 1331.531094][ T5422] [ 1331.541603][ T5424] BPF:[1] FUNC_PROTO (anon) [ 1331.548679][ T5424] BPF:return=1610612736 args=( [ 1331.560860][ T5424] BPF:0 (anon) [ 1331.573825][ T5424] BPF:, 0 (anon) [ 1331.583289][ T5424] BPF:, 3 (invalid-name-offset) [ 1331.603140][ T5424] BPF:) [ 1331.608828][ T5424] BPF: 06:52:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x11}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1331.623503][ T5432] netlink: 'syz-executor.3': attribute type 84 has an invalid length. [ 1331.634472][ T5424] BPF:Invalid return type [ 1331.643520][ T5424] BPF: [ 1331.643520][ T5424] [ 1331.716901][ T5436] BPF:[1] FUNC_PROTO (anon) [ 1331.728072][ T5436] BPF:return=0 args=( [ 1331.737307][ T5436] BPF:0 (invalid-name-offset) [ 1331.748291][ T5436] BPF:, vararg [ 1331.755230][ T5436] BPF:) [ 1331.761793][ T5436] BPF: [ 1331.776618][ T5436] BPF:Invalid arg#1 [ 1331.780456][ T5436] BPF: [ 1331.780456][ T5436] 06:52:10 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x10}, 0x10}, 0x7}, 0x0) 06:52:10 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r0, &(0x7f00000068c0)={0x78}, 0xfffffffffffffdef) 06:52:10 executing program 1: mlockall(0x3) mlockall(0x3) 06:52:10 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x19, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:52:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x68000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x12}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:10 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0xffff, 0x0) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0) close(r0) [ 1332.274509][ T5452] BPF:[1] FUNC_PROTO (anon) [ 1332.286454][ T5452] BPF:return=1744830464 args=( [ 1332.293515][ T5454] BPF:[1] FUNC_PROTO (anon) 06:52:10 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcsa\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 1332.331723][ T5454] BPF:return=0 args=( [ 1332.336078][ T5452] BPF:0 (anon) [ 1332.351735][ T5454] BPF:0 (invalid-name-offset) [ 1332.355817][ T5452] BPF:, 0 (anon) [ 1332.364661][ T5454] BPF:, vararg 06:52:10 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_BMAP(r0, &(0x7f0000000000)={0x18, 0x0, r1}, 0x18) [ 1332.379750][ T5454] BPF:) [ 1332.393247][ T5452] BPF:, 3 (invalid-name-offset) [ 1332.395898][ T5454] BPF: [ 1332.406140][ T5454] BPF:Invalid arg#1 [ 1332.413264][ T5452] BPF:) [ 1332.417567][ T5454] BPF: [ 1332.417567][ T5454] [ 1332.428323][ T5452] BPF: 06:52:10 executing program 0: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000000)="f9", 0x1, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, r0) [ 1332.441122][ T5452] BPF:Invalid return type [ 1332.446242][ T5464] BPF:[1] FUNC_PROTO (anon) [ 1332.464679][ T5464] BPF:return=0 args=( [ 1332.467169][ T5452] BPF: [ 1332.467169][ T5452] [ 1332.484423][ T5464] BPF:0 (invalid-name-offset) 06:52:10 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x180000000) [ 1332.499577][ T5470] BPF:[1] FUNC_PROTO (anon) [ 1332.508689][ T5464] BPF:, vararg [ 1332.524364][ T5464] BPF:) [ 1332.535349][ T5464] BPF: [ 1332.540625][ T5470] BPF:return=1744830464 args=( [ 1332.545472][ T5470] BPF:0 (anon) 06:52:10 executing program 5: select(0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x0, 0xea60}) [ 1332.548805][ T5464] BPF:Invalid arg#1 [ 1332.570432][ T5470] BPF:, 0 (anon) 06:52:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={0x0}}, 0x20040040) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1332.594527][ T5464] BPF: [ 1332.594527][ T5464] [ 1332.597790][ T5470] BPF:, 3 (invalid-name-offset) [ 1332.610108][ T5470] BPF:) [ 1332.626295][ T5470] BPF: 06:52:10 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, r0, 0x0, 0x0, 0x0}, 0x30) 06:52:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x6c000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1332.641285][ T5470] BPF:Invalid return type [ 1332.641297][ T5470] BPF: [ 1332.641297][ T5470] [ 1332.768944][ T5488] BPF:[1] FUNC_PROTO (anon) [ 1332.780509][ T5488] BPF:return=1811939328 args=( [ 1332.790539][ T5488] BPF:0 (anon) [ 1332.794156][ T5488] BPF:, 0 (anon) [ 1332.804861][ T5488] BPF:, 3 (invalid-name-offset) [ 1332.812993][ T5488] BPF:) [ 1332.815783][ T5488] BPF: [ 1332.819501][ T5488] BPF:Invalid return type [ 1332.824349][ T5488] BPF: [ 1332.824349][ T5488] [ 1332.865483][ T5490] BPF:[1] FUNC_PROTO (anon) [ 1332.872328][ T5490] BPF:return=1811939328 args=( [ 1332.884861][ T5490] BPF:0 (anon) [ 1332.897171][ T5490] BPF:, 0 (anon) [ 1332.900754][ T5490] BPF:, 3 (invalid-name-offset) [ 1332.905606][ T5490] BPF:) [ 1332.922377][ T5490] BPF: [ 1332.925225][ T5490] BPF:Invalid return type [ 1332.937642][ T5490] BPF: [ 1332.937642][ T5490] 06:52:11 executing program 1: mlockall(0x3) mlockall(0x3) 06:52:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1e}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:11 executing program 0: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@empty, @random="b5c5cd05d828", @val={@void, {0x8100, 0x1}}, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @broadcast, @rand_addr, @link_local, @local}}}}, 0x0) 06:52:11 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x9, 0x3, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0xa00}}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:52:11 executing program 5: syz_emit_ethernet(0x5a, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffff0180c200000081"], 0x0) 06:52:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x74000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:11 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 06:52:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f00000000c0)) io_submit(0x0, 0x0, 0x0) 06:52:11 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcsa\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002540)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$namespace(r1, 0x0) [ 1333.416012][ T5508] BPF:[1] FUNC_PROTO (anon) [ 1333.422428][ T5508] BPF:return=1946157056 args=( [ 1333.446733][ T5510] BPF:[1] FUNC_PROTO (anon) [ 1333.451975][ T5510] BPF:return=0 args=( [ 1333.455967][ T5510] BPF:0 (invalid-name-offset) [ 1333.461584][ T5510] BPF:, vararg [ 1333.463743][ T5508] BPF:0 (anon) [ 1333.464961][ T5510] BPF:) [ 1333.464968][ T5510] BPF: [ 1333.464975][ T5510] BPF:Invalid arg#1 [ 1333.464982][ T5510] BPF: [ 1333.464982][ T5510] [ 1333.481482][ T5508] BPF:, 0 (anon) [ 1333.498604][ T5508] BPF:, 3 (invalid-name-offset) 06:52:11 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xa, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1333.518910][ T5515] BPF:[1] FUNC_PROTO (anon) [ 1333.521270][ T5508] BPF:) [ 1333.529365][ T5515] BPF:return=0 args=( [ 1333.539087][ T5508] BPF: [ 1333.540580][ T5515] BPF:0 (invalid-name-offset) [ 1333.552453][ T5508] BPF:Invalid return type [ 1333.555675][ T5515] BPF:, vararg [ 1333.565037][ T5515] BPF:) 06:52:11 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0xc008240a, 0x0) [ 1333.575611][ T5515] BPF: [ 1333.577468][ T5508] BPF: [ 1333.577468][ T5508] [ 1333.587614][ T5515] BPF:Invalid arg#1 [ 1333.596077][ T5515] BPF: [ 1333.596077][ T5515] 06:52:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000b00)={'batadv_slave_1\x00'}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={@empty, 0x0, r2}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@rand_addr=' \x01\x00', 0x4f, r2}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='x', 0x1, 0xfffffffffffffffe) [ 1333.620378][ T5525] BPF:[1] FUNC_PROTO (anon) [ 1333.649051][ T5525] BPF:return=1946157056 args=( [ 1333.673320][ T5525] BPF:0 (anon) [ 1333.697908][ T5525] BPF:, 0 (anon) [ 1333.721315][ T5525] BPF:, 3 (invalid-name-offset) [ 1333.731915][ T5525] BPF:) [ 1333.736489][ T5525] BPF: [ 1333.742266][ T5525] BPF:Invalid return type [ 1333.747243][ T5525] BPF: [ 1333.747243][ T5525] 06:52:12 executing program 1: mlockall(0x3) mlockall(0x3) 06:52:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x25}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:12 executing program 3: fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) 06:52:12 executing program 5: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000140)="b1", 0x1, 0xfffffffffffffffc) 06:52:12 executing program 0: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000002300)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) write$tcp_congestion(r0, &(0x7f0000002340)='dctcp\x00', 0x6) 06:52:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x7a000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:12 executing program 3: timer_create(0x1, &(0x7f0000000140)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000240)) 06:52:12 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, 0x0, 0x14c0, 0x1}, 0x40) [ 1334.359562][ T5549] BPF:[1] FUNC_PROTO (anon) [ 1334.373128][ T5549] BPF:return=0 args=( [ 1334.380829][ T5551] BPF:[1] FUNC_PROTO (anon) [ 1334.391683][ T5549] BPF:0 (invalid-name-offset) [ 1334.397193][ T5551] BPF:return=2046820352 args=( 06:52:12 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r0, &(0x7f00000068c0)={0x78, 0x0, r2}, 0x78) [ 1334.410755][ T5549] BPF:, vararg [ 1334.415290][ T5551] BPF:0 (anon) [ 1334.433328][ T5549] BPF:) [ 1334.436839][ T5551] BPF:, 0 (anon) [ 1334.442755][ T5549] BPF: [ 1334.448581][ T5551] BPF:, 3 (invalid-name-offset) [ 1334.456256][ T5549] BPF:Invalid arg#1 [ 1334.465206][ T5551] BPF:) [ 1334.471159][ T5549] BPF: [ 1334.471159][ T5549] [ 1334.478630][ T5551] BPF: [ 1334.482361][ T5551] BPF:Invalid return type [ 1334.497874][ T5560] BPF:[1] FUNC_PROTO (anon) [ 1334.503770][ T5551] BPF: [ 1334.503770][ T5551] 06:52:12 executing program 3: syz_emit_ethernet(0xd2, &(0x7f0000000000)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "a9f344", 0x9c, 0x11, 0x0, @remote, @local, {[], {0x0, 0x0, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "d9b73d4355434973341c2be604e6b228b1b7f2f21e77a9dfcd35a7191a14ebc5", "432659542058df5897f24d5a9388b0c2b126a8f2a686f472b8e91fb8a6155bc11f79f6ab7bff4c51c05b517872810026", "8d4bcd805e93a2c26fe829f9a467a75e65dbe80dd24cdb9ab354f113", {"6d62315b47bba3d70c8a290d347b7222", "617b5e1e2ec5e63dab0c0c661fb0db08"}}}}}}}}, 0x0) 06:52:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x1, &(0x7f00000004c0)=@raw=[@ldst={0x3, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x1, 0x91, &(0x7f0000000100)=""/145, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1334.515665][ T5560] BPF:return=0 args=( [ 1334.525758][ T5560] BPF:0 (invalid-name-offset) [ 1334.533364][ T5560] BPF:, vararg [ 1334.533486][ T5564] BPF:[1] FUNC_PROTO (anon) [ 1334.553662][ T5560] BPF:) [ 1334.557405][ T5564] BPF:return=2046820352 args=( 06:52:12 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000002c0)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x208200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) read(r1, &(0x7f0000000180)=""/19, 0xfffffe47) [ 1334.566383][ T5560] BPF: [ 1334.573808][ T5564] BPF:0 (anon) [ 1334.578844][ T5560] BPF:Invalid arg#1 [ 1334.590729][ T5564] BPF:, 0 (anon) [ 1334.603553][ T5560] BPF: [ 1334.603553][ T5560] [ 1334.621621][ T5564] BPF:, 3 (invalid-name-offset) [ 1334.640661][ T5564] BPF:) [ 1334.652908][ T5564] BPF: [ 1334.663747][ T5564] BPF:Invalid return type [ 1334.684691][ T5564] BPF: [ 1334.684691][ T5564] [ 1334.711723][ T36] audit: type=1804 audit(1616827932.503:66): pid=5574 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir776313334/syzkaller.QKfAgK/3350/file0/bus" dev="ramfs" ino=207362 res=1 errno=0 [ 1334.806247][ T36] audit: type=1804 audit(1616827932.533:67): pid=5574 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir776313334/syzkaller.QKfAgK/3350/file0/bus" dev="ramfs" ino=207362 res=1 errno=0 [ 1334.855094][ T36] audit: type=1804 audit(1616827932.643:68): pid=5574 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir776313334/syzkaller.QKfAgK/3350/file0/file0/bus" dev="ramfs" ino=206539 res=1 errno=0 [ 1334.911891][ T36] audit: type=1804 audit(1616827932.643:69): pid=5574 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir776313334/syzkaller.QKfAgK/3350/file0/file0/bus" dev="ramfs" ino=206539 res=1 errno=0 06:52:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000000000000000000000000020850000002c0000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r1}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 06:52:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x43}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:13 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000002c0)='./bus\x00', 0x0, 0x1c) ftruncate(r0, 0x208200) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 06:52:13 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) 06:52:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xb, 0x6, 0x3, 0xffffffff, 0x1}, 0x40) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000140)=""/130}, 0x18) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000300)={r0, &(0x7f0000000280), 0xffffffffffffffff}, 0x20) 06:52:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xa0000000, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1335.451312][ T5594] BPF:[1] FUNC_PROTO (anon) [ 1335.460533][ T5594] BPF:return=0 args=( [ 1335.473387][ T5594] BPF:0 (invalid-name-offset) 06:52:13 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @remote={0x6}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1335.481432][ T36] audit: type=1804 audit(1616827933.273:70): pid=5597 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir769797519/syzkaller.lCDq3s/3413/file0/bus" dev="ramfs" ino=206552 res=1 errno=0 [ 1335.489864][ T5594] BPF:, vararg [ 1335.512967][ T5600] BPF:[1] FUNC_PROTO (anon) [ 1335.531416][ T5596] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1335.544580][ T5600] BPF:return=2684354560 args=( [ 1335.563358][ T5600] BPF:0 (anon) [ 1335.581288][ T5600] BPF:, 0 (anon) [ 1335.589240][ T5596] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1335.595646][ T5600] BPF:, 3 (invalid-name-offset) 06:52:13 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1335.613497][ T5594] BPF:) [ 1335.617703][ T36] audit: type=1804 audit(1616827933.313:71): pid=5597 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir769797519/syzkaller.lCDq3s/3413/file0/bus" dev="ramfs" ino=206552 res=1 errno=0 [ 1335.623918][ T5600] BPF:) [ 1335.645858][ T5594] BPF: 06:52:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x4}, 0x10) write(r0, &(0x7f0000000080)="240000001a005f0014f9f4070009040002002000000000ffffa888000800050000000000", 0x24) [ 1335.660912][ T5594] BPF:Invalid arg#1 [ 1335.666828][ T5594] BPF: [ 1335.666828][ T5594] [ 1335.687172][ T5596] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1335.688202][ T5610] BPF:[1] FUNC_PROTO (anon) [ 1335.718191][ T5600] BPF: [ 1335.720988][ T5600] BPF:Invalid return type [ 1335.725512][ T5600] BPF: [ 1335.725512][ T5600] [ 1335.737936][ T5610] BPF:return=0 args=( [ 1335.759382][ T5610] BPF:0 (invalid-name-offset) [ 1335.764104][ T5610] BPF:, vararg [ 1335.788103][ T5610] BPF:) [ 1335.791728][ T5615] BPF:[1] FUNC_PROTO (anon) [ 1335.796351][ T5615] BPF:return=2684354560 args=( 06:52:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000000000000000000000000020850000002c0000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r1}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1335.808085][ T5610] BPF: [ 1335.810918][ T5610] BPF:Invalid arg#1 [ 1335.814754][ T5610] BPF: [ 1335.814754][ T5610] [ 1335.823011][ T36] audit: type=1804 audit(1616827933.313:72): pid=5597 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir769797519/syzkaller.lCDq3s/3413/file0/bus" dev="ramfs" ino=206552 res=1 errno=0 [ 1335.846587][ T5615] BPF:0 (anon) [ 1335.869972][ T5615] BPF:, 0 (anon) [ 1335.892067][ T5615] BPF:, 3 (invalid-name-offset) 06:52:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x48}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:13 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1335.918111][ T5615] BPF:) [ 1335.920919][ T5615] BPF: [ 1335.923693][ T5615] BPF:Invalid return type [ 1335.953529][ T5615] BPF: [ 1335.953529][ T5615] [ 1336.000702][ T5625] BPF:[1] FUNC_PROTO (anon) [ 1336.021678][ T5625] BPF:return=0 args=( [ 1336.034932][ T5625] BPF:0 (invalid-name-offset) [ 1336.048941][ T5625] BPF:, vararg [ 1336.055839][ T5625] BPF:) [ 1336.064320][ T5625] BPF: [ 1336.070738][ T5625] BPF:Invalid arg#1 [ 1336.081863][ T5625] BPF: [ 1336.081863][ T5625] [ 1336.103696][ T5629] BPF:[1] FUNC_PROTO (anon) [ 1336.115339][ T5629] BPF:return=0 args=( [ 1336.129830][ T5629] BPF:0 (invalid-name-offset) [ 1336.146056][ T5629] BPF:, vararg [ 1336.156719][ T5629] BPF:) [ 1336.165261][ T5629] BPF: [ 1336.171908][ T5629] BPF:Invalid arg#1 [ 1336.180487][ T5629] BPF: [ 1336.180487][ T5629] 06:52:14 executing program 5: r0 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) readv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/84, 0x54}], 0x1) read$FUSE(r0, 0x0, 0x2) 06:52:14 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000480)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='0', 0x1}], 0x1) socketpair(0x22, 0x2, 0x23, &(0x7f00000001c0)) 06:52:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xffff0f00, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:14 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) 06:52:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4c}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1336.338971][ T5602] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1336.354998][ T5626] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1336.398145][ T5644] BPF:[1] FUNC_PROTO (anon) 06:52:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000000000000000000000000020850000002c0000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r1}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1336.428801][ T5644] BPF:return=0 args=( [ 1336.439542][ T5646] BPF:[1] FUNC_PROTO (anon) [ 1336.446602][ T5644] BPF:0 (invalid-name-offset) [ 1336.451140][ T5646] BPF:return=4294905600 args=( [ 1336.472261][ T5647] delete_channel: no stack [ 1336.473603][ T5646] BPF:0 (anon) [ 1336.479184][ T5644] BPF:, vararg [ 1336.481865][ T5646] BPF:, 0 (anon) [ 1336.493077][ T5647] delete_channel: no stack [ 1336.497298][ T5646] BPF:, 3 (invalid-name-offset) [ 1336.502578][ T5644] BPF:) [ 1336.505897][ T5646] BPF:) [ 1336.514939][ T5644] BPF: [ 1336.525246][ T5646] BPF: 06:52:14 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) 06:52:14 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xb, 0x5, 0x3, 0x2, 0x1}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, 0x0, 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000140)=""/130}, 0x18) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000300)={r0, &(0x7f0000000280), 0xffffffffffffffff}, 0x20) [ 1336.526078][ T5644] BPF:Invalid arg#1 [ 1336.542132][ T5644] BPF: [ 1336.542132][ T5644] [ 1336.543169][ T5646] BPF:Invalid return type 06:52:14 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000480)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='0', 0x1}], 0x1) socket$inet_udplite(0x2, 0x2, 0x88) [ 1336.573796][ T5646] BPF: [ 1336.573796][ T5646] [ 1336.575480][ T5656] BPF:[1] FUNC_PROTO (anon) [ 1336.597161][ T5656] BPF:return=0 args=( [ 1336.619459][ T5656] BPF:0 (invalid-name-offset) [ 1336.619545][ T5661] BPF:[1] FUNC_PROTO (anon) [ 1336.644115][ T5656] BPF:, vararg [ 1336.654252][ T5661] BPF:return=4294905600 args=( [ 1336.668396][ T5656] BPF:) 06:52:14 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) 06:52:14 executing program 5: unshare(0x400) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0x7, 0x0, 0x0) [ 1336.675700][ T5661] BPF:0 (anon) [ 1336.691773][ T5661] BPF:, 0 (anon) [ 1336.697851][ T5656] BPF: [ 1336.700693][ T5656] BPF:Invalid arg#1 [ 1336.704155][ T5661] BPF:, 3 (invalid-name-offset) 06:52:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000000000000000000000000020850000002c0000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r1}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1336.725338][ T5656] BPF: [ 1336.725338][ T5656] 06:52:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x60}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1336.753130][ T5661] BPF:) [ 1336.768218][ T5661] BPF: [ 1336.776287][ T5661] BPF:Invalid return type 06:52:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) [ 1336.812889][ T5661] BPF: [ 1336.812889][ T5661] [ 1336.882573][ T5683] BPF:[1] FUNC_PROTO (anon) 06:52:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0xffffff7f, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:14 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r1, 0x0) 06:52:14 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1336.912361][ T5683] BPF:return=0 args=( [ 1336.929392][ T5686] delete_channel: no stack [ 1336.930521][ T5683] BPF:0 (invalid-name-offset) [ 1336.944488][ T5686] delete_channel: no stack 06:52:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000000000000000000000000020850000002c0000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r1}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1336.971188][ T5683] BPF:, vararg [ 1336.983859][ T5683] BPF:) [ 1336.991021][ T5683] BPF: [ 1337.001690][ T5683] BPF:Invalid arg#1 [ 1337.018559][ T5683] BPF: 06:52:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) [ 1337.018559][ T5683] [ 1337.031555][ T5692] BPF:[1] FUNC_PROTO (anon) [ 1337.042044][ T5692] BPF:return=4294967167 args=( [ 1337.054302][ T5692] BPF:0 (anon) [ 1337.066373][ T5692] BPF:, 0 (anon) [ 1337.070643][ T5698] BPF:[1] FUNC_PROTO (anon) [ 1337.081663][ T5698] BPF:return=0 args=( [ 1337.089576][ T5692] BPF:, 3 (invalid-name-offset) [ 1337.101755][ T5698] BPF:0 (invalid-name-offset) [ 1337.110176][ T5692] BPF:) 06:52:14 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') ftruncate(0xffffffffffffffff, 0x208200) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000002c0)={0xb}, 0xb) [ 1337.123167][ T5692] BPF: [ 1337.126495][ T5698] BPF:, vararg [ 1337.142386][ T5692] BPF:Invalid return type [ 1337.149442][ T5704] delete_channel: no stack [ 1337.154321][ T5698] BPF:) [ 1337.163199][ T5698] BPF: [ 1337.179016][ T5692] BPF: [ 1337.179016][ T5692] [ 1337.184405][ T5704] delete_channel: no stack [ 1337.191373][ T5698] BPF:Invalid arg#1 [ 1337.205351][ T5698] BPF: [ 1337.205351][ T5698] [ 1337.219026][ T5706] BPF:[1] FUNC_PROTO (anon) 06:52:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000000000000000000000000020850000002c0000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r1}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, 0x0) [ 1337.241032][ T5706] BPF:return=4294967167 args=( 06:52:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) 06:52:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x68}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1337.274418][ T5706] BPF:0 (anon) [ 1337.291129][ T5706] BPF:, 0 (anon) [ 1337.313413][ T5706] BPF:, 3 (invalid-name-offset) 06:52:15 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') ftruncate(0xffffffffffffffff, 0x208200) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000002c0)={0xb}, 0xb) [ 1337.332740][ T5706] BPF:) [ 1337.345111][ T5706] BPF: [ 1337.357901][ T5706] BPF:Invalid return type [ 1337.369995][ T5714] BPF:[1] FUNC_PROTO (anon) [ 1337.379894][ T5706] BPF: [ 1337.379894][ T5706] [ 1337.394975][ T5714] BPF:return=0 args=( [ 1337.405520][ T5719] delete_channel: no stack [ 1337.415707][ T5714] BPF:0 (invalid-name-offset) 06:52:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1337.430445][ T5719] delete_channel: no stack [ 1337.443170][ T5714] BPF:, vararg [ 1337.463691][ T5714] BPF:) 06:52:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) 06:52:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000000000000000000000000020850000002c0000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r1}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) [ 1337.488400][ T5714] BPF: [ 1337.502227][ T5714] BPF:Invalid arg#1 [ 1337.534592][ T5714] BPF: [ 1337.534592][ T5714] [ 1337.565301][ T5726] BPF:[1] FUNC_PROTO (anon) [ 1337.575494][ T5727] BPF:[1] FUNC_PROTO (anon) [ 1337.585388][ T5726] BPF:return=0 args=( [ 1337.593039][ T5727] BPF:return=0 args=( [ 1337.600962][ T5726] BPF:0 (invalid-name-offset) [ 1337.606069][ T5727] BPF:0 (anon) [ 1337.614600][ T5726] BPF:, vararg [ 1337.620492][ T5730] delete_channel: no stack [ 1337.622759][ T5727] BPF:, 0 (anon) [ 1337.634296][ T5726] BPF:) [ 1337.640491][ T5730] delete_channel: no stack [ 1337.642877][ T5726] BPF: [ 1337.650946][ T5727] BPF:, 3 (invalid-name-offset) 06:52:15 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') ftruncate(0xffffffffffffffff, 0x208200) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000002c0)={0xb}, 0xb) 06:52:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) 06:52:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) [ 1337.664869][ T5726] BPF:Invalid arg#1 [ 1337.670606][ T5727] BPF:) [ 1337.689759][ T5727] BPF: [ 1337.692738][ T5726] BPF: [ 1337.692738][ T5726] [ 1337.707612][ T5727] BPF:Invalid arg#1 [ 1337.727874][ T5727] BPF: [ 1337.727874][ T5727] 06:52:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x6c}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000000000000000000000000020850000002c0000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r1}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) 06:52:15 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1337.771979][ T5738] BPF:[1] FUNC_PROTO (anon) [ 1337.785428][ T5740] delete_channel: no stack [ 1337.797141][ T5738] BPF:return=0 args=( [ 1337.803630][ T5740] delete_channel: no stack [ 1337.823193][ T5738] BPF:0 (anon) [ 1337.836623][ T5743] delete_channel: no stack [ 1337.843503][ T5744] BPF:[1] FUNC_PROTO (anon) [ 1337.843765][ T5738] BPF:, 0 (anon) [ 1337.849714][ T5744] BPF:return=0 args=( [ 1337.859270][ T5744] BPF:0 (invalid-name-offset) [ 1337.859988][ T5743] delete_channel: no stack 06:52:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) [ 1337.870830][ T5738] BPF:, 3 (invalid-name-offset) [ 1337.873417][ T5744] BPF:, vararg [ 1337.891277][ T5744] BPF:) [ 1337.895790][ T5744] BPF: [ 1337.896949][ T5738] BPF:) [ 1337.904426][ T5744] BPF:Invalid arg#1 [ 1337.915274][ T5738] BPF: [ 1337.918554][ T5744] BPF: [ 1337.918554][ T5744] 06:52:15 executing program 3: r0 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x2) [ 1337.926372][ T5738] BPF:Invalid arg#1 [ 1337.944661][ T5738] BPF: [ 1337.944661][ T5738] [ 1337.963772][ T5751] BPF:[1] FUNC_PROTO (anon) 06:52:15 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) 06:52:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x2}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000000000000000000000000020850000002c0000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r1}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 1337.989964][ T5752] delete_channel: no stack [ 1338.002261][ T5751] BPF:return=0 args=( [ 1338.016069][ T5752] delete_channel: no stack [ 1338.021683][ T5751] BPF:0 (invalid-name-offset) [ 1338.053837][ T5751] BPF:, vararg [ 1338.063716][ T5751] BPF:) [ 1338.072178][ T5751] BPF: [ 1338.081392][ T5751] BPF:Invalid arg#1 [ 1338.091689][ T5751] BPF: [ 1338.091689][ T5751] 06:52:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) 06:52:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x74}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:15 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1338.103487][ T5759] BPF:[1] FUNC_PROTO (anon) [ 1338.109612][ T5759] BPF:return=0 args=( [ 1338.126628][ T5759] BPF:0 (invalid-name-offset) [ 1338.145793][ T5759] BPF:, 0 (anon) [ 1338.174435][ T5759] BPF:, 3 (invalid-name-offset) 06:52:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r2, @ANYBLOB="32003300d080001effffffffffff08021100000150505050505000000000000000ed"], 0x50}}, 0x0) [ 1338.195498][ T5759] BPF:) [ 1338.213195][ T5765] delete_channel: no stack [ 1338.220351][ T5759] BPF: [ 1338.227679][ T5759] BPF:Invalid arg#1 [ 1338.232795][ T5765] delete_channel: no stack [ 1338.241614][ T5759] BPF: [ 1338.241614][ T5759] [ 1338.250622][ T5767] BPF:[1] FUNC_PROTO (anon) [ 1338.270448][ T5767] BPF:return=0 args=( [ 1338.282591][ T5771] BPF:[1] FUNC_PROTO (anon) 06:52:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) 06:52:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000000000000000000000000020850000002c0000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r1}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) [ 1338.293129][ T5767] BPF:0 (invalid-name-offset) [ 1338.302759][ T5771] BPF:return=0 args=( [ 1338.309948][ T5767] BPF:, vararg [ 1338.313802][ T5771] BPF:0 (invalid-name-offset) [ 1338.320651][ T5767] BPF:) [ 1338.323992][ T5767] BPF: [ 1338.331650][ T5771] BPF:, 0 (anon) 06:52:16 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1338.346862][ T5767] BPF:Invalid arg#1 [ 1338.358979][ T5771] BPF:, 3 (invalid-name-offset) [ 1338.367672][ T5767] BPF: [ 1338.367672][ T5767] [ 1338.380680][ T5771] BPF:) [ 1338.384770][ T5776] delete_channel: no stack 06:52:16 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000280)='/dev/adsp1\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) readv(r0, 0x0, 0x0) [ 1338.398527][ T5771] BPF: [ 1338.400332][ T5776] delete_channel: no stack [ 1338.406093][ T5778] BPF:[1] FUNC_PROTO (anon) [ 1338.421414][ T5771] BPF:Invalid arg#1 [ 1338.433036][ T5778] BPF:return=0 args=( [ 1338.438552][ T5771] BPF: [ 1338.438552][ T5771] [ 1338.450579][ T5778] BPF:0 (invalid-name-offset) 06:52:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) 06:52:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1338.474269][ T5778] BPF:, vararg [ 1338.492067][ T5778] BPF:) [ 1338.507053][ T5778] BPF: [ 1338.537471][ T5778] BPF:Invalid arg#1 06:52:16 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1338.560352][ T5778] BPF: [ 1338.560352][ T5778] [ 1338.593175][ T5787] delete_channel: no stack 06:52:16 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000280)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SYNC(r0, 0x5001, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000000)=0x5) readv(r0, &(0x7f00000024c0)=[{&(0x7f0000000340)=""/216, 0xd8}], 0x1) [ 1338.614078][ T5787] delete_channel: no stack 06:52:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) 06:52:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7a}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1338.640123][ T5789] BPF:[1] FUNC_PROTO (anon) [ 1338.667957][ T5789] BPF:return=0 args=( [ 1338.680778][ T5789] BPF:0 (invalid-name-offset) [ 1338.704993][ T5789] BPF:, 0 (anon) 06:52:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) [ 1338.724238][ T5789] BPF:, 3 (invalid-name-offset) [ 1338.760173][ T5789] BPF:) [ 1338.775608][ T5799] BPF:[1] FUNC_PROTO (anon) [ 1338.775935][ T5789] BPF: [ 1338.798852][ T5799] BPF:return=0 args=( 06:52:16 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1338.810555][ T5789] BPF:Invalid arg#1 [ 1338.827607][ T5799] BPF:0 (invalid-name-offset) [ 1338.829112][ T5789] BPF: [ 1338.829112][ T5789] [ 1338.841351][ T5800] delete_channel: no stack [ 1338.851788][ T5799] BPF:, vararg [ 1338.860374][ T5800] delete_channel: no stack [ 1338.873354][ T5799] BPF:) [ 1338.886307][ T5803] BPF:[1] FUNC_PROTO (anon) [ 1338.887306][ T5799] BPF: [ 1338.911246][ T5803] BPF:return=0 args=( [ 1338.929555][ T5803] BPF:0 (invalid-name-offset) [ 1338.932037][ T5799] BPF:Invalid arg#1 06:52:16 executing program 3: unshare(0x400) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, 0x0, 0x0) 06:52:16 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) [ 1338.961546][ T5803] BPF:, 0 (anon) [ 1338.976380][ T5799] BPF: [ 1338.976380][ T5799] [ 1338.992136][ T5803] BPF:, 3 (invalid-name-offset) [ 1339.028355][ T5808] BPF:[1] FUNC_PROTO (anon) [ 1339.033146][ T5803] BPF:) [ 1339.035916][ T5803] BPF: [ 1339.046593][ T5808] BPF:return=0 args=( [ 1339.050627][ T5808] BPF:0 (invalid-name-offset) [ 1339.055366][ T5803] BPF:Invalid arg#1 [ 1339.076225][ T5803] BPF: 06:52:16 executing program 1: mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1339.076225][ T5803] [ 1339.095780][ T5808] BPF:, vararg [ 1339.104342][ T5811] delete_channel: no stack [ 1339.121824][ T5808] BPF:) 06:52:16 executing program 3: unshare(0x400) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000000)=ANY=[], 0x4) 06:52:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1339.126805][ T5811] delete_channel: no stack [ 1339.146274][ T5808] BPF: [ 1339.159878][ T5808] BPF:Invalid arg#1 [ 1339.185634][ T5808] BPF: [ 1339.185634][ T5808] 06:52:17 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) 06:52:17 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) 06:52:17 executing program 1: mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) 06:52:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xa0}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1339.264296][ T5818] BPF:[1] FUNC_PROTO (anon) 06:52:17 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1339.323675][ T5818] BPF:return=0 args=( [ 1339.324363][ T5822] delete_channel: no stack [ 1339.343786][ T5818] BPF:0 (invalid-name-offset) [ 1339.360603][ T5822] delete_channel: no stack [ 1339.371358][ T5818] BPF:, 0 (anon) [ 1339.388428][ T5818] BPF:, 3 (invalid-name-offset) [ 1339.397467][ T5828] BPF:[1] FUNC_PROTO (anon) 06:52:17 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) 06:52:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r3, @ANYBLOB="32003300d080001effffffffffff08021100000150505050505000000000000000ed"], 0x50}}, 0x0) 06:52:17 executing program 1: mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) 06:52:17 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) [ 1339.423243][ T5818] BPF:) [ 1339.426904][ T5828] BPF:return=0 args=( [ 1339.451995][ T5818] BPF: [ 1339.463344][ T5828] BPF:0 (invalid-name-offset) [ 1339.495829][ T5833] delete_channel: no stack [ 1339.506089][ T5833] delete_channel: no stack [ 1339.511395][ T5818] BPF:Invalid arg#1 [ 1339.525381][ T5828] BPF:, vararg [ 1339.529672][ T5818] BPF: [ 1339.529672][ T5818] 06:52:17 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) [ 1339.550464][ T5828] BPF:) [ 1339.566612][ T5828] BPF: [ 1339.580923][ T5828] BPF:Invalid arg#1 [ 1339.581563][ T5839] BPF:[1] FUNC_PROTO (anon) 06:52:17 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) [ 1339.609560][ T5828] BPF: [ 1339.609560][ T5828] [ 1339.624935][ T5839] BPF:return=0 args=( [ 1339.652192][ T5839] BPF:0 (invalid-name-offset) [ 1339.659925][ T5828] BPF:[1] FUNC_PROTO (anon) [ 1339.674829][ T5828] BPF:return=0 args=( [ 1339.692017][ T5846] delete_channel: no stack [ 1339.693393][ T5839] BPF:, 0 (anon) [ 1339.697765][ T5828] BPF:0 (invalid-name-offset) [ 1339.712632][ T5828] BPF:, vararg [ 1339.719644][ T5846] delete_channel: no stack [ 1339.731273][ T5839] BPF:, 3 (invalid-name-offset) [ 1339.732501][ T5828] BPF:) [ 1339.747211][ T5839] BPF:) [ 1339.758121][ T5839] BPF: [ 1339.763689][ T5828] BPF: [ 1339.769294][ T5839] BPF:Invalid arg#1 [ 1339.782065][ T5839] BPF: [ 1339.782065][ T5839] [ 1339.785255][ T5828] BPF:Invalid arg#1 [ 1339.801059][ T5828] BPF: [ 1339.801059][ T5828] 06:52:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x5}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:17 executing program 3: unshare(0x400) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, 0x0, 0x0) 06:52:17 executing program 0: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) 06:52:17 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) 06:52:17 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) 06:52:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x300}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:17 executing program 0: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) 06:52:17 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) [ 1339.943142][ T5858] delete_channel: no stack [ 1339.954031][ T5860] BPF:[1] FUNC_PROTO (anon) [ 1339.963949][ T5861] BPF:[1] FUNC_PROTO (anon) [ 1339.984208][ T5858] delete_channel: no stack [ 1339.985674][ T5860] BPF:return=0 args=( 06:52:17 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1340.010063][ T5860] BPF:0 (invalid-name-offset) [ 1340.011602][ T5861] BPF:return=0 args=( [ 1340.029162][ T5860] BPF:, vararg [ 1340.051108][ T5861] BPF:0 (invalid-name-offset) [ 1340.055894][ T5860] BPF:) [ 1340.072128][ T5860] BPF: [ 1340.078115][ T5861] BPF:, 0 (anon) [ 1340.085738][ T5860] BPF:Invalid arg#1 06:52:17 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) 06:52:17 executing program 0: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) [ 1340.101482][ T5860] BPF: [ 1340.101482][ T5860] [ 1340.122636][ T5861] BPF:, 3 (invalid-name-offset) [ 1340.129869][ T5867] Mount JFS Failure: -22 [ 1340.148987][ T5867] jfs_mount failed w/return code = -22 [ 1340.155290][ T5872] BPF:[1] FUNC_PROTO (anon) [ 1340.175300][ T5861] BPF:) [ 1340.199131][ T5861] BPF: [ 1340.202528][ T5872] BPF:return=0 args=( [ 1340.221323][ T5861] BPF:Invalid arg#1 [ 1340.226595][ T5872] BPF:0 (invalid-name-offset) [ 1340.231429][ T5872] BPF:, vararg [ 1340.235041][ T5872] BPF:) [ 1340.238109][ T5872] BPF: [ 1340.241200][ T5872] BPF:Invalid arg#1 [ 1340.245170][ T5872] BPF: 06:52:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x500}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1340.245170][ T5872] [ 1340.252624][ T5876] delete_channel: no stack [ 1340.257377][ T5876] delete_channel: no stack [ 1340.265606][ T5867] Mount JFS Failure: -22 [ 1340.273688][ T5861] BPF: [ 1340.273688][ T5861] [ 1340.294074][ T5880] BPF:[1] FUNC_PROTO (anon) 06:52:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x6}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) 06:52:18 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1340.320776][ T5867] jfs_mount failed w/return code = -22 [ 1340.333887][ T5880] BPF:return=0 args=( [ 1340.337928][ T5880] BPF:0 (invalid-name-offset) [ 1340.342623][ T5880] BPF:, 0 (anon) [ 1340.346219][ T5880] BPF:, 3 (invalid-name-offset) [ 1340.351279][ T5880] BPF:) [ 1340.354051][ T5880] BPF: [ 1340.357500][ T5880] BPF:Invalid arg#1 [ 1340.361316][ T5880] BPF: [ 1340.361316][ T5880] [ 1340.362317][ T5883] BPF:[1] FUNC_PROTO (anon) 06:52:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 1340.429189][ T5883] BPF:return=0 args=( 06:52:18 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) [ 1340.454479][ T5883] BPF:0 (invalid-name-offset) [ 1340.480000][ T5889] BPF:[1] FUNC_PROTO (anon) [ 1340.492515][ T5883] BPF:, vararg 06:52:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 06:52:18 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) 06:52:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) [ 1340.511211][ T5889] BPF:return=0 args=( [ 1340.513011][ T5883] BPF:) [ 1340.531662][ T5889] BPF:0 (invalid-name-offset) [ 1340.558434][ T5889] BPF:, 0 (anon) [ 1340.560951][ T5883] BPF: [ 1340.568634][ T5883] BPF:Invalid arg#1 [ 1340.573169][ T5889] BPF:, 3 (invalid-name-offset) [ 1340.584398][ T5883] BPF: [ 1340.584398][ T5883] [ 1340.604509][ T5895] Mount JFS Failure: -22 [ 1340.617618][ T5889] BPF:) [ 1340.620630][ T5889] BPF: [ 1340.623661][ T5889] BPF:Invalid arg#1 [ 1340.627926][ T5889] BPF: [ 1340.627926][ T5889] [ 1340.633674][ T5895] jfs_mount failed w/return code = -22 [ 1340.633749][ T5902] BPF:[1] FUNC_PROTO (anon) [ 1340.677672][ T5903] BPF:[1] FUNC_PROTO (anon) [ 1340.677682][ T5902] BPF:return=0 args=( [ 1340.677692][ T5902] BPF:0 (invalid-name-offset) [ 1340.695826][ T5902] BPF:, vararg [ 1340.716331][ T5902] BPF:) [ 1340.720758][ T5902] BPF: [ 1340.723551][ T5902] BPF:Invalid arg#1 06:52:18 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1340.728620][ T5902] BPF: [ 1340.728620][ T5902] 06:52:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 06:52:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x600}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) [ 1340.758156][ T5903] BPF:return=0 args=( [ 1340.762332][ T5903] BPF:0 (invalid-name-offset) [ 1340.775424][ T5903] BPF:, 0 (anon) [ 1340.780851][ T5903] BPF:, 3 (invalid-name-offset) [ 1340.799998][ T5903] BPF:) [ 1340.809988][ T5903] BPF: [ 1340.824558][ T5903] BPF:Invalid arg#1 [ 1340.843370][ T5903] BPF: [ 1340.843370][ T5903] [ 1340.870709][ T5914] BPF:[1] FUNC_PROTO (anon) 06:52:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x7}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:18 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) 06:52:18 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) 06:52:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) [ 1340.904049][ T5914] BPF:return=0 args=( [ 1340.925261][ T5914] BPF:0 (invalid-name-offset) 06:52:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) [ 1340.952546][ T5914] BPF:, vararg [ 1340.965687][ T5914] BPF:) [ 1340.971857][ T5914] BPF: [ 1340.982130][ T5914] BPF:Invalid arg#1 [ 1340.995515][ T5922] Mount JFS Failure: -22 [ 1341.005755][ T5914] BPF: [ 1341.005755][ T5914] [ 1341.022639][ T5922] jfs_mount failed w/return code = -22 [ 1341.030323][ T5926] BPF:[1] FUNC_PROTO (anon) [ 1341.051554][ T5927] BPF:[1] FUNC_PROTO (anon) 06:52:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 06:52:18 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1341.061660][ T5929] delete_channel: no stack [ 1341.067081][ T5929] delete_channel: no stack [ 1341.099186][ T5926] BPF:return=0 args=( [ 1341.104770][ T5927] BPF:return=0 args=( 06:52:18 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) 06:52:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) [ 1341.133368][ T5926] BPF:0 (invalid-name-offset) [ 1341.140310][ T5927] BPF:0 (invalid-name-offset) [ 1341.161547][ T5927] BPF:, vararg [ 1341.166172][ T5926] BPF:, 0 (anon) [ 1341.204635][ T5927] BPF:) [ 1341.208698][ T5926] BPF:, 3 (invalid-name-offset) [ 1341.220618][ T5927] BPF: [ 1341.232773][ T5926] BPF:) [ 1341.235913][ T5927] BPF:Invalid arg#1 [ 1341.246111][ T5926] BPF: 06:52:19 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1341.253843][ T5927] BPF: [ 1341.253843][ T5927] [ 1341.262529][ T5926] BPF:Invalid arg#1 [ 1341.275849][ T5926] BPF: [ 1341.275849][ T5926] [ 1341.284643][ T5940] delete_channel: no stack 06:52:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x700}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) [ 1341.304810][ T5940] delete_channel: no stack [ 1341.313553][ T5941] Mount JFS Failure: -22 [ 1341.315029][ T5944] BPF:[1] FUNC_PROTO (anon) [ 1341.331304][ T5941] jfs_mount failed w/return code = -22 [ 1341.337123][ T5944] BPF:return=0 args=( [ 1341.341272][ T5944] BPF:0 (invalid-name-offset) [ 1341.346762][ T5944] BPF:, 0 (anon) [ 1341.350524][ T5944] BPF:, 3 (invalid-name-offset) [ 1341.359312][ T5944] BPF:) [ 1341.362327][ T5944] BPF: [ 1341.365264][ T5944] BPF:Invalid arg#1 [ 1341.369311][ T5944] BPF: [ 1341.369311][ T5944] [ 1341.412147][ T5950] BPF:[1] FUNC_PROTO (anon) 06:52:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x8}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) 06:52:19 executing program 3: syz_mount_image$jfs(0x0, &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) 06:52:19 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1341.438468][ T5950] BPF:return=0 args=( [ 1341.449305][ T5950] BPF:0 (invalid-name-offset) [ 1341.459688][ T5950] BPF:, vararg [ 1341.485563][ T5950] BPF:) [ 1341.507776][ T5950] BPF: 06:52:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 1341.529821][ T5950] BPF:Invalid arg#1 [ 1341.542538][ T5959] BPF:[1] FUNC_PROTO (anon) 06:52:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 1341.577453][ T5965] delete_channel: no stack [ 1341.581843][ T5950] BPF: [ 1341.581843][ T5950] [ 1341.581969][ T5965] delete_channel: no stack [ 1341.591782][ T5959] BPF:return=0 args=( [ 1341.600141][ T5959] BPF:0 (invalid-name-offset) [ 1341.611102][ T5959] BPF:, 0 (anon) [ 1341.615292][ T5959] BPF:, 3 (invalid-name-offset) [ 1341.623250][ T5967] BPF:[1] FUNC_PROTO (anon) [ 1341.624743][ T5959] BPF:) [ 1341.635003][ T5959] BPF: [ 1341.638292][ T5959] BPF:Invalid arg#1 [ 1341.642523][ T5959] BPF: [ 1341.642523][ T5959] [ 1341.651708][ T5959] BPF:[1] FUNC_PROTO (anon) [ 1341.663289][ T5959] BPF:return=0 args=( [ 1341.668104][ T5959] BPF:0 (invalid-name-offset) [ 1341.673323][ T5959] BPF:, 0 (anon) 06:52:19 executing program 3: syz_mount_image$jfs(0x0, &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) 06:52:19 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1341.679560][ T5967] BPF:return=0 args=( 06:52:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:52:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) [ 1341.701775][ T5967] BPF:0 (invalid-name-offset) [ 1341.708867][ T5959] BPF:, 3 (invalid-name-offset) [ 1341.713725][ T5959] BPF:) [ 1341.716477][ T5959] BPF: [ 1341.746583][ T5967] BPF:, vararg [ 1341.750064][ T5967] BPF:) [ 1341.752834][ T5967] BPF: [ 1341.787950][ T5959] BPF:Invalid arg#1 [ 1341.791803][ T5959] BPF: [ 1341.791803][ T5959] [ 1341.817046][ T5967] BPF:Invalid arg#1 [ 1341.820884][ T5967] BPF: [ 1341.820884][ T5967] [ 1341.837256][ T5981] delete_channel: no stack [ 1341.841873][ T5981] delete_channel: no stack 06:52:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x900}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) 06:52:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x9}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:19 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) 06:52:19 executing program 3: syz_mount_image$jfs(0x0, &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) 06:52:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) [ 1342.006405][ T5991] BPF:[1] FUNC_PROTO (anon) [ 1342.030924][ T5991] BPF:return=0 args=( [ 1342.044054][ T5994] BPF:[1] FUNC_PROTO (anon) [ 1342.048881][ T5997] delete_channel: no stack [ 1342.055033][ T5991] BPF:0 (invalid-name-offset) [ 1342.069585][ T5994] BPF:return=0 args=( [ 1342.073530][ T5997] delete_channel: no stack 06:52:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) [ 1342.082916][ T5991] BPF:, vararg [ 1342.116735][ T5991] BPF:) [ 1342.119807][ T5991] BPF: [ 1342.122876][ T5991] BPF:Invalid arg#1 [ 1342.127038][ T5991] BPF: [ 1342.127038][ T5991] [ 1342.132183][ T5994] BPF:0 (invalid-name-offset) [ 1342.138812][ T5994] BPF:, 0 (anon) [ 1342.142596][ T5994] BPF:, 3 (invalid-name-offset) [ 1342.147767][ T5994] BPF:) [ 1342.150790][ T5994] BPF: [ 1342.153811][ T5994] BPF:Invalid arg#1 [ 1342.158317][ T5994] BPF: [ 1342.158317][ T5994] 06:52:19 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', 0x0, 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) 06:52:19 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1342.164966][ T6000] BPF:[1] FUNC_PROTO (anon) [ 1342.187134][ T5994] BPF:[1] FUNC_PROTO (anon) [ 1342.192408][ T6000] BPF:return=0 args=( [ 1342.192854][ T5994] BPF:return=0 args=( 06:52:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) 06:52:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) [ 1342.223618][ T5994] BPF:0 (invalid-name-offset) [ 1342.239091][ T6000] BPF:0 (invalid-name-offset) [ 1342.246758][ T5994] BPF:, 0 (anon) [ 1342.259772][ T5994] BPF:, 3 (invalid-name-offset) [ 1342.268498][ T5994] BPF:) 06:52:20 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(0x0, 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1342.274909][ T5994] BPF: [ 1342.282881][ T5994] BPF:Invalid arg#1 [ 1342.290985][ T6000] BPF:, vararg [ 1342.291551][ T5994] BPF: [ 1342.291551][ T5994] [ 1342.309813][ T6000] BPF:) [ 1342.334032][ T6000] BPF: [ 1342.341368][ T6015] delete_channel: no stack [ 1342.354972][ T6000] BPF:Invalid arg#1 [ 1342.360425][ T6015] delete_channel: no stack [ 1342.382110][ T6000] BPF: [ 1342.382110][ T6000] 06:52:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xa00}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:20 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(0x0, 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) 06:52:20 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', 0x0, 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) 06:52:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xa}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}]}, 0x2c}}, 0x0) 06:52:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) [ 1342.545415][ T6029] BPF:[1] FUNC_PROTO (anon) 06:52:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}]}, 0x2c}}, 0x0) [ 1342.569753][ T6032] BPF:[1] FUNC_PROTO (anon) [ 1342.574355][ T6029] BPF:return=0 args=( [ 1342.583282][ T6033] delete_channel: no stack [ 1342.592913][ T6029] BPF:0 (invalid-name-offset) [ 1342.599969][ T6032] BPF:return=0 args=( [ 1342.607759][ T6033] delete_channel: no stack 06:52:20 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(0x0, 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1342.623964][ T6032] BPF:0 (invalid-name-offset) [ 1342.624782][ T6029] BPF:, vararg 06:52:20 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', 0x0, 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) [ 1342.679476][ T6029] BPF:) [ 1342.682352][ T6029] BPF: [ 1342.685223][ T6029] BPF:Invalid arg#1 [ 1342.698059][ T6032] BPF:, 0 (anon) [ 1342.710691][ T6029] BPF: [ 1342.710691][ T6029] [ 1342.719357][ T6032] BPF:, 3 (invalid-name-offset) 06:52:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) [ 1342.741648][ T6032] BPF:) [ 1342.762301][ T6044] BPF:[1] FUNC_PROTO (anon) [ 1342.762487][ T6032] BPF: [ 1342.783204][ T6044] BPF:return=0 args=( [ 1342.792841][ T6032] BPF:Invalid arg#1 [ 1342.802834][ T6044] BPF:0 (invalid-name-offset) 06:52:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}]}, 0x2c}}, 0x0) 06:52:20 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1342.811607][ T6032] BPF: [ 1342.811607][ T6032] [ 1342.827799][ T6044] BPF:, vararg [ 1342.842988][ T6044] BPF:) [ 1342.845252][ T6054] delete_channel: no stack [ 1342.859177][ T6044] BPF: [ 1342.864262][ T6055] BPF:[1] FUNC_PROTO (anon) [ 1342.885988][ T6044] BPF:Invalid arg#1 [ 1342.897053][ T6054] delete_channel: no stack [ 1342.905161][ T6055] BPF:return=0 args=( [ 1342.913294][ T6044] BPF: [ 1342.913294][ T6044] [ 1342.925959][ T6055] BPF:0 (invalid-name-offset) 06:52:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xb00}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:20 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) 06:52:20 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) [ 1342.959272][ T6055] BPF:, 0 (anon) [ 1342.963130][ T6055] BPF:, 3 (invalid-name-offset) [ 1342.984358][ T6055] BPF:) [ 1342.992311][ T6055] BPF: [ 1342.995973][ T6055] BPF:Invalid arg#1 [ 1343.003312][ T6055] BPF: [ 1343.003312][ T6055] 06:52:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xb}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 06:52:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) 06:52:20 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) 06:52:20 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) [ 1343.057089][ T6070] BPF:[1] FUNC_PROTO (anon) [ 1343.062328][ T6070] BPF:return=0 args=( [ 1343.073346][ T6070] BPF:0 (invalid-name-offset) [ 1343.094435][ T6070] BPF:, vararg [ 1343.100761][ T6079] delete_channel: no stack [ 1343.109631][ T6070] BPF:) [ 1343.118100][ T6079] delete_channel: no stack [ 1343.128189][ T6070] BPF: [ 1343.140456][ T6070] BPF:Invalid arg#1 [ 1343.154096][ T6082] BPF:[1] FUNC_PROTO (anon) 06:52:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) 06:52:21 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1343.163549][ T6070] BPF: [ 1343.163549][ T6070] [ 1343.179092][ T6082] BPF:return=0 args=( [ 1343.194236][ T6082] BPF:0 (invalid-name-offset) [ 1343.200595][ T6086] BPF:[1] FUNC_PROTO (anon) 06:52:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) [ 1343.218386][ T6086] BPF:return=0 args=( [ 1343.220023][ T6082] BPF:, 0 (anon) [ 1343.224586][ T6086] BPF:0 (invalid-name-offset) [ 1343.242875][ T6082] BPF:, 3 (invalid-name-offset) [ 1343.245583][ T6086] BPF:, vararg [ 1343.255912][ T6086] BPF:) [ 1343.266068][ T6086] BPF: 06:52:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) [ 1343.267806][ T6082] BPF:) [ 1343.274258][ T6092] delete_channel: no stack [ 1343.280671][ T6082] BPF: [ 1343.285009][ T6086] BPF:Invalid arg#1 [ 1343.292795][ T6092] delete_channel: no stack [ 1343.299227][ T6082] BPF:Invalid arg#1 [ 1343.299265][ T6086] BPF: [ 1343.299265][ T6086] 06:52:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xc00}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) [ 1343.322628][ T6082] BPF: [ 1343.322628][ T6082] [ 1343.342233][ T6097] delete_channel: no stack 06:52:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, 0x0) [ 1343.375231][ T6098] BPF:[1] FUNC_PROTO (anon) [ 1343.390724][ T6097] delete_channel: no stack [ 1343.404873][ T6098] BPF:return=0 args=( [ 1343.418456][ T6098] BPF:0 (invalid-name-offset) [ 1343.432444][ T6104] BPF:[1] FUNC_PROTO (anon) [ 1343.443846][ T6106] delete_channel: no stack [ 1343.451016][ T6098] BPF:, 0 (anon) [ 1343.453130][ T6104] BPF:return=0 args=( [ 1343.467159][ T6098] BPF:, 3 (invalid-name-offset) [ 1343.469941][ T6104] BPF:0 (invalid-name-offset) [ 1343.472859][ T6106] delete_channel: no stack [ 1343.493968][ T6098] BPF:) [ 1343.495212][ T6104] BPF:, vararg [ 1343.500427][ T6104] BPF:) [ 1343.503182][ T6104] BPF: [ 1343.505940][ T6104] BPF:Invalid arg#1 [ 1343.508747][ T6098] BPF: [ 1343.509818][ T6104] BPF: [ 1343.509818][ T6104] [ 1343.526500][ T6098] BPF:Invalid arg#1 [ 1343.545680][ T6112] BPF:[1] FUNC_PROTO (anon) [ 1343.552533][ T6098] BPF: [ 1343.552533][ T6098] [ 1343.565038][ T6112] BPF:return=0 args=( [ 1343.575202][ T6112] BPF:0 (invalid-name-offset) 06:52:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xc}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:21 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) 06:52:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) 06:52:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, 0x0) 06:52:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) [ 1343.593066][ T6112] BPF:, vararg [ 1343.599424][ T6112] BPF:) [ 1343.602430][ T6112] BPF: [ 1343.605410][ T6112] BPF:Invalid arg#1 [ 1343.633961][ T6112] BPF: [ 1343.633961][ T6112] 06:52:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xd00}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1343.673771][ T6121] delete_channel: no stack [ 1343.693996][ T6124] delete_channel: no stack [ 1343.704681][ T6121] delete_channel: no stack [ 1343.705902][ T6129] BPF:[1] FUNC_PROTO (anon) [ 1343.714219][ T6126] BPF:[1] FUNC_PROTO (anon) [ 1343.715901][ T6129] BPF:return=0 args=( 06:52:21 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0xb}, 0xb) [ 1343.724276][ T6129] BPF:0 (invalid-name-offset) [ 1343.726350][ T6124] delete_channel: no stack [ 1343.729951][ T6129] BPF:, vararg [ 1343.737578][ T6129] BPF:) [ 1343.740723][ T6129] BPF: [ 1343.743847][ T6129] BPF:Invalid arg#1 [ 1343.749256][ T6129] BPF: [ 1343.749256][ T6129] 06:52:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, 0x0) [ 1343.780033][ T6126] BPF:return=0 args=( [ 1343.784128][ T6126] BPF:0 (invalid-name-offset) 06:52:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) 06:52:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) 06:52:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xe00}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1343.835865][ T6126] BPF:, 0 (anon) [ 1343.841883][ T6126] BPF:, 3 (invalid-name-offset) [ 1343.859956][ T6135] delete_channel: no stack [ 1343.865982][ T6135] delete_channel: no stack 06:52:21 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000002c0)={0xb}, 0xb) [ 1343.887901][ T6126] BPF:) [ 1343.895714][ T6126] BPF: [ 1343.907525][ T6126] BPF:Invalid arg#1 [ 1343.921886][ T6126] BPF: [ 1343.921886][ T6126] [ 1343.928743][ T6142] BPF:[1] FUNC_PROTO (anon) [ 1343.929218][ T6141] delete_channel: no stack [ 1343.938708][ T6142] BPF:return=0 args=( [ 1343.943190][ T6142] BPF:0 (invalid-name-offset) [ 1343.951223][ T6142] BPF:, vararg [ 1343.955244][ T6142] BPF:) [ 1343.960264][ T6142] BPF: [ 1343.961508][ T6141] delete_channel: no stack [ 1343.963721][ T6148] BPF:[1] FUNC_PROTO (anon) [ 1343.973423][ T6142] BPF:Invalid arg#1 [ 1343.999622][ T6148] BPF:return=0 args=( [ 1344.001579][ T6142] BPF: [ 1344.001579][ T6142] [ 1344.019939][ T6148] BPF:0 (invalid-name-offset) [ 1344.020320][ T6149] BPF:[1] FUNC_PROTO (anon) [ 1344.024624][ T6148] BPF:, 0 (anon) [ 1344.024634][ T6148] BPF:, 3 (invalid-name-offset) [ 1344.024642][ T6148] BPF:) [ 1344.024648][ T6148] BPF: [ 1344.024654][ T6148] BPF:Invalid arg#1 06:52:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xd}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) 06:52:21 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000002c0)={0xb}, 0xb) 06:52:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) 06:52:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0]) [ 1344.048865][ T6148] BPF: [ 1344.048865][ T6148] [ 1344.060946][ T6149] BPF:return=0 args=( [ 1344.066892][ T6149] BPF:0 (invalid-name-offset) [ 1344.071631][ T6149] BPF:, vararg [ 1344.075120][ T6149] BPF:) [ 1344.081622][ T6149] BPF: [ 1344.086964][ T6149] BPF:Invalid arg#1 [ 1344.093684][ T6149] BPF: [ 1344.093684][ T6149] 06:52:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1100}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:21 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000002c0)={0xb}, 0xb) [ 1344.158184][ T6160] BPF:[1] FUNC_PROTO (anon) [ 1344.164468][ T6159] Mount JFS Failure: -22 [ 1344.170369][ T6159] jfs_mount failed w/return code = -22 [ 1344.176016][ T6160] BPF:return=0 args=( [ 1344.178386][ T6161] delete_channel: no stack [ 1344.180322][ T6160] BPF:0 (invalid-name-offset) [ 1344.191089][ T6160] BPF:, 0 (anon) [ 1344.191627][ T6165] delete_channel: no stack [ 1344.194720][ T6160] BPF:, 3 (invalid-name-offset) 06:52:22 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0]) [ 1344.201368][ T6161] delete_channel: no stack [ 1344.204601][ T6160] BPF:) [ 1344.225947][ T6160] BPF: [ 1344.234953][ T6165] delete_channel: no stack [ 1344.240717][ T6160] BPF:Invalid arg#1 [ 1344.249127][ T6160] BPF: [ 1344.249127][ T6160] 06:52:22 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, 0x0, 0x0) [ 1344.265577][ T6170] BPF:[1] FUNC_PROTO (anon) [ 1344.281139][ T6170] BPF:return=0 args=( [ 1344.292709][ T6172] BPF:[1] FUNC_PROTO (anon) [ 1344.300903][ T6170] BPF:0 (invalid-name-offset) 06:52:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) socketpair(0x22, 0x2, 0x11, &(0x7f00000001c0)) 06:52:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) [ 1344.312916][ T6172] BPF:return=0 args=( [ 1344.320287][ T6170] BPF:, 0 (anon) [ 1344.323990][ T6172] BPF:0 (invalid-name-offset) [ 1344.333158][ T6176] Mount JFS Failure: -22 [ 1344.341749][ T6170] BPF:, 3 (invalid-name-offset) [ 1344.348200][ T6176] jfs_mount failed w/return code = -22 [ 1344.358409][ T6172] BPF:, vararg 06:52:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xe}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1344.366777][ T6170] BPF:) [ 1344.369702][ T6170] BPF: [ 1344.372602][ T6170] BPF:Invalid arg#1 [ 1344.374144][ T6172] BPF:) [ 1344.377256][ T6170] BPF: [ 1344.377256][ T6170] [ 1344.396692][ T6172] BPF: [ 1344.410191][ T6172] BPF:Invalid arg#1 06:52:22 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0]) 06:52:22 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, 0x0, 0x0) [ 1344.426587][ T6172] BPF: [ 1344.426587][ T6172] [ 1344.428496][ T6188] delete_channel: no stack [ 1344.447404][ T6187] delete_channel: no stack [ 1344.451726][ T6188] delete_channel: no stack [ 1344.462013][ T6187] delete_channel: no stack 06:52:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x0, 0x2, 0x11, &(0x7f00000001c0)) 06:52:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) [ 1344.481260][ T6191] BPF:[1] FUNC_PROTO (anon) [ 1344.498174][ T6192] BPF:[1] FUNC_PROTO (anon) [ 1344.506296][ T6191] BPF:return=0 args=( [ 1344.515536][ T6192] BPF:return=0 args=( [ 1344.518257][ T6191] BPF:0 (invalid-name-offset) [ 1344.525113][ T6191] BPF:, vararg 06:52:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1200}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1344.535041][ T6194] Mount JFS Failure: -22 [ 1344.539437][ T6191] BPF:) [ 1344.542467][ T6194] jfs_mount failed w/return code = -22 [ 1344.549833][ T6191] BPF: [ 1344.552758][ T6191] BPF:Invalid arg#1 [ 1344.555440][ T6192] BPF:0 (invalid-name-offset) [ 1344.557406][ T6191] BPF: [ 1344.557406][ T6191] [ 1344.565035][ T6192] BPF:, 0 (anon) 06:52:22 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) write$P9_RREADDIR(r0, 0x0, 0x0) 06:52:22 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB]) [ 1344.610854][ T6192] BPF:, 3 (invalid-name-offset) [ 1344.622161][ T6204] delete_channel: no stack [ 1344.632488][ T6192] BPF:) [ 1344.634756][ T6204] delete_channel: no stack 06:52:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) 06:52:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x0, 0x2, 0x11, &(0x7f00000001c0)) [ 1344.659578][ T6192] BPF: [ 1344.670809][ T6192] BPF:Invalid arg#1 [ 1344.684771][ T6192] BPF: [ 1344.684771][ T6192] [ 1344.719238][ T6212] BPF:[1] FUNC_PROTO (anon) [ 1344.725528][ T6192] BPF:[1] FUNC_PROTO (anon) [ 1344.734039][ T6192] BPF:return=0 args=( [ 1344.739587][ T6212] BPF:return=0 args=( [ 1344.749712][ T6218] Mount JFS Failure: -22 [ 1344.756662][ T6192] BPF:0 (invalid-name-offset) [ 1344.761731][ T6192] BPF:, 0 (anon) 06:52:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xf}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1344.765657][ T6192] BPF:, 3 (invalid-name-offset) [ 1344.768998][ T6212] BPF:0 (invalid-name-offset) [ 1344.773976][ T6192] BPF:) [ 1344.779569][ T6212] BPF:, vararg [ 1344.779640][ T6192] BPF: [ 1344.784919][ T6218] jfs_mount failed w/return code = -22 [ 1344.786104][ T6192] BPF:Invalid arg#1 [ 1344.795737][ T6192] BPF: [ 1344.795737][ T6192] [ 1344.812604][ T6212] BPF:) [ 1344.815383][ T6212] BPF: 06:52:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) [ 1344.818263][ T6224] delete_channel: no stack [ 1344.818489][ T6212] BPF:Invalid arg#1 [ 1344.827604][ T6212] BPF: [ 1344.827604][ T6212] [ 1344.832400][ T6224] delete_channel: no stack [ 1344.841254][ T6225] BPF:[1] FUNC_PROTO (anon) [ 1344.864760][ T6228] BPF:[1] FUNC_PROTO (anon) 06:52:22 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB]) 06:52:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x0, 0x2, 0x11, &(0x7f00000001c0)) [ 1344.870809][ T6228] BPF:return=0 args=( [ 1344.874935][ T6228] BPF:0 (invalid-name-offset) [ 1344.880835][ T6228] BPF:, 0 (anon) [ 1344.884451][ T6225] BPF:return=0 args=( [ 1344.896927][ T6228] BPF:, 3 (invalid-name-offset) [ 1344.901975][ T6225] BPF:0 (invalid-name-offset) 06:52:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) [ 1344.924992][ T6228] BPF:) [ 1344.929219][ T6225] BPF:, vararg [ 1344.939098][ T6228] BPF: [ 1344.944358][ T6225] BPF:) [ 1344.949716][ T6228] BPF:Invalid arg#1 [ 1344.957263][ T6225] BPF: [ 1344.966044][ T6228] BPF: [ 1344.966044][ T6228] [ 1344.972500][ T6225] BPF:Invalid arg#1 [ 1344.988909][ T6225] BPF: [ 1344.988909][ T6225] [ 1344.996066][ T6240] delete_channel: no stack [ 1345.000665][ T6244] BPF:[1] FUNC_PROTO (anon) [ 1345.016049][ T6241] Mount JFS Failure: -22 [ 1345.016945][ T6240] delete_channel: no stack 06:52:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x3, &(0x7f00000001c0)) 06:52:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x0, 0x11, &(0x7f00000001c0)) 06:52:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1e00}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1345.025884][ T6244] BPF:return=0 args=( [ 1345.036133][ T6241] jfs_mount failed w/return code = -22 [ 1345.045513][ T6244] BPF:0 (invalid-name-offset) [ 1345.086723][ T6244] BPF:, 0 (anon) [ 1345.090445][ T6244] BPF:, 3 (invalid-name-offset) [ 1345.095537][ T6244] BPF:) [ 1345.098537][ T6244] BPF: [ 1345.101466][ T6244] BPF:Invalid arg#1 [ 1345.105462][ T6244] BPF: [ 1345.105462][ T6244] 06:52:22 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB]) 06:52:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x10}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) [ 1345.167779][ T6254] BPF:[1] FUNC_PROTO (anon) [ 1345.180413][ T6254] BPF:return=0 args=( [ 1345.201074][ T6254] BPF:0 (invalid-name-offset) 06:52:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) 06:52:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x0, 0x11, &(0x7f00000001c0)) [ 1345.217859][ T6254] BPF:, vararg [ 1345.224679][ T6262] BPF:[1] FUNC_PROTO (anon) [ 1345.235310][ T6254] BPF:) [ 1345.241575][ T6262] BPF:return=0 args=( [ 1345.250269][ T6264] delete_channel: no stack [ 1345.256284][ T6254] BPF: [ 1345.259824][ T6261] Mount JFS Failure: -22 [ 1345.262986][ T6254] BPF:Invalid arg#1 [ 1345.264383][ T6261] jfs_mount failed w/return code = -22 [ 1345.268891][ T6264] delete_channel: no stack [ 1345.288825][ T6262] BPF:0 (invalid-name-offset) 06:52:23 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x4}, 0x10) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000200200003000000000000000800050000000000", 0x24) 06:52:23 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodis']) [ 1345.352837][ T6254] BPF: [ 1345.352837][ T6254] [ 1345.360602][ T6262] BPF:, 0 (anon) [ 1345.383545][ T6262] BPF:, 3 (invalid-name-offset) 06:52:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) [ 1345.411804][ T6262] BPF:) [ 1345.416856][ T6275] BPF:[1] FUNC_PROTO (anon) [ 1345.421722][ T6275] BPF:return=0 args=( [ 1345.425880][ T6275] BPF:0 (invalid-name-offset) [ 1345.431612][ T6262] BPF: [ 1345.439617][ T6262] BPF:Invalid arg#1 [ 1345.455367][ T6262] BPF: [ 1345.455367][ T6262] 06:52:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x0, 0x11, &(0x7f00000001c0)) 06:52:23 executing program 1: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) clone3(&(0x7f00000004c0)={0x20002400, 0x0, &(0x7f00000002c0), &(0x7f0000000300), {0x1}, &(0x7f0000000340)=""/39, 0x27, 0x0, &(0x7f0000000480)=[0x0], 0x1}, 0x58) [ 1345.459439][ T6275] BPF:, vararg [ 1345.475034][ T6275] BPF:) [ 1345.484347][ T6281] delete_channel: no stack [ 1345.491139][ T6280] jfs: Unrecognized mount option "nodis" or missing value [ 1345.504194][ T6275] BPF: [ 1345.509354][ T6285] BPF:[1] FUNC_PROTO (anon) [ 1345.516632][ T6275] BPF:Invalid arg#1 [ 1345.522124][ T6285] BPF:return=0 args=( [ 1345.528833][ T6281] delete_channel: no stack [ 1345.541716][ T6275] BPF: [ 1345.541716][ T6275] 06:52:23 executing program 1: linkat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0, 0x1000) [ 1345.560418][ T6285] BPF:0 (invalid-name-offset) [ 1345.585719][ T6285] BPF:, 0 (anon) [ 1345.613175][ T6285] BPF:, 3 (invalid-name-offset) [ 1345.632434][ T6285] BPF:) [ 1345.635212][ T6285] BPF: 06:52:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x2000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:23 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) 06:52:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x11}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x0, &(0x7f00000001c0)) 06:52:23 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodis']) 06:52:23 executing program 1: clock_gettime(0x0, &(0x7f0000000180)={0x0}) pselect6(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000380)={r0}, &(0x7f0000000400)={&(0x7f00000003c0)={[0x9]}, 0x8}) [ 1345.656605][ T6285] BPF:Invalid arg#1 [ 1345.660635][ T6285] BPF: [ 1345.660635][ T6285] [ 1345.682587][ T6296] delete_channel: no stack [ 1345.687982][ T6296] delete_channel: no stack 06:52:23 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) [ 1345.728290][ T6297] BPF:[1] FUNC_PROTO (anon) [ 1345.748031][ T6297] BPF:return=0 args=( [ 1345.767312][ T6297] BPF:0 (invalid-name-offset) 06:52:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x0, &(0x7f00000001c0)) [ 1345.786931][ T6297] BPF:, vararg [ 1345.789312][ T6304] jfs: Unrecognized mount option "nodis" or missing value [ 1345.800666][ T6306] BPF:[1] FUNC_PROTO (anon) [ 1345.802972][ T6297] BPF:) [ 1345.810912][ T6306] BPF:return=0 args=( [ 1345.827976][ T6297] BPF: [ 1345.832002][ T6310] delete_channel: no stack 06:52:23 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodis']) [ 1345.837815][ T6306] BPF:0 (invalid-name-offset) [ 1345.844164][ T6297] BPF:Invalid arg#1 [ 1345.848414][ T6310] delete_channel: no stack [ 1345.853078][ T6306] BPF:, 0 (anon) [ 1345.860500][ T6306] BPF:, 3 (invalid-name-offset) [ 1345.861750][ T6297] BPF: [ 1345.861750][ T6297] [ 1345.881661][ T6306] BPF:) [ 1345.885233][ T6306] BPF: 06:52:23 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) 06:52:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x0, &(0x7f00000001c0)) [ 1345.902495][ T6306] BPF:Invalid arg#1 [ 1345.919084][ T6306] BPF: [ 1345.919084][ T6306] [ 1345.927460][ T6315] BPF:[1] FUNC_PROTO (anon) [ 1345.936329][ T6315] BPF:return=0 args=( [ 1345.944841][ T6318] BPF:[1] FUNC_PROTO (anon) [ 1345.949733][ T6315] BPF:0 (invalid-name-offset) [ 1345.954602][ T6318] BPF:return=0 args=( [ 1345.961168][ T6315] BPF:, vararg [ 1345.965734][ T6315] BPF:) [ 1345.969981][ T6318] BPF:0 (invalid-name-offset) [ 1345.980127][ T6315] BPF: [ 1345.986290][ T6318] BPF:, 0 (anon) [ 1345.987919][ T6321] delete_channel: no stack [ 1345.991205][ T6315] BPF:Invalid arg#1 06:52:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x2500}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1345.999241][ T6321] delete_channel: no stack [ 1346.007381][ T6320] jfs: Unrecognized mount option "nodis" or missing value [ 1346.019852][ T6318] BPF:, 3 (invalid-name-offset) [ 1346.026060][ T6315] BPF: [ 1346.026060][ T6315] [ 1346.027607][ T6318] BPF:) [ 1346.045794][ T6318] BPF: [ 1346.049639][ T6318] BPF:Invalid arg#1 06:52:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x12}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:23 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) [ 1346.053822][ T6318] BPF: [ 1346.053822][ T6318] 06:52:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, 0x0) [ 1346.085787][ T6329] BPF:[1] FUNC_PROTO (anon) [ 1346.090583][ T6329] BPF:return=0 args=( [ 1346.094722][ T6329] BPF:0 (invalid-name-offset) [ 1346.100287][ T6329] BPF:, vararg [ 1346.108417][ T6329] BPF:) [ 1346.114853][ T6329] BPF: [ 1346.122983][ T6329] BPF:Invalid arg#1 06:52:23 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodisca']) [ 1346.136617][ T6329] BPF: [ 1346.136617][ T6329] [ 1346.173964][ T6337] BPF:[1] FUNC_PROTO (anon) [ 1346.182233][ T6336] BPF:[1] FUNC_PROTO (anon) [ 1346.186923][ T6337] BPF:return=0 args=( [ 1346.192818][ T6338] delete_channel: no stack [ 1346.195355][ T6337] BPF:0 (invalid-name-offset) [ 1346.203205][ T6336] BPF:return=0 args=( [ 1346.205486][ T6337] BPF:, vararg [ 1346.211739][ T6337] BPF:) [ 1346.212336][ T6338] delete_channel: no stack [ 1346.214729][ T6337] BPF: [ 1346.224757][ T6337] BPF:Invalid arg#1 [ 1346.227119][ T6336] BPF:0 (invalid-name-offset) [ 1346.231076][ T6337] BPF: [ 1346.231076][ T6337] [ 1346.238607][ T6336] BPF:, 0 (anon) [ 1346.238619][ T6336] BPF:, 3 (invalid-name-offset) [ 1346.238633][ T6336] BPF:) [ 1346.238639][ T6336] BPF: [ 1346.238645][ T6336] BPF:Invalid arg#1 [ 1346.238651][ T6336] BPF: [ 1346.238651][ T6336] 06:52:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, 0x0) [ 1346.268361][ T6339] jfs: Unrecognized mount option "nodisca" or missing value [ 1346.269090][ T6343] BPF:[1] FUNC_PROTO (anon) [ 1346.280348][ T6343] BPF:return=0 args=( [ 1346.284344][ T6343] BPF:0 (invalid-name-offset) [ 1346.289398][ T6343] BPF:, 0 (anon) [ 1346.292986][ T6343] BPF:, 3 (invalid-name-offset) [ 1346.297969][ T6343] BPF:) [ 1346.300730][ T6343] BPF: [ 1346.303522][ T6343] BPF:Invalid arg#1 [ 1346.307374][ T6343] BPF: [ 1346.307374][ T6343] 06:52:24 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000000980)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@fadd={0x58, 0x114, 0x6, {{}, &(0x7f0000000500), 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}}, @mask_cswp={0x58, 0x114, 0x9, {{}, 0x0, 0x0}}], 0xb0}, 0x0) 06:52:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x25}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:24 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) 06:52:24 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodisca']) 06:52:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x11, 0x0) 06:52:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4300}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1346.686360][ T6375] delete_channel: no stack [ 1346.688250][ T6369] BPF:[1] FUNC_PROTO (anon) [ 1346.695282][ T6370] jfs: Unrecognized mount option "nodisca" or missing value [ 1346.706050][ T6375] delete_channel: no stack [ 1346.710289][ T6376] BPF:[1] FUNC_PROTO (anon) [ 1346.719839][ T6369] BPF:return=0 args=( [ 1346.728303][ T6376] BPF:return=0 args=( 06:52:24 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) 06:52:24 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000580)='ns/time\x00') [ 1346.732645][ T6376] BPF:0 (invalid-name-offset) [ 1346.739828][ T6376] BPF:, 0 (anon) [ 1346.743758][ T6376] BPF:, 3 (invalid-name-offset) [ 1346.749665][ T6376] BPF:) [ 1346.750810][ T6369] BPF:0 (invalid-name-offset) [ 1346.752700][ T6376] BPF: [ 1346.772523][ T6376] BPF:Invalid arg#1 06:52:24 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000000980)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@fadd={0x58, 0x114, 0x6, {{}, &(0x7f0000000500), 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}}, @mask_cswp={0x58, 0x114, 0x9, {{}, 0x0, 0x0}}], 0xb0}, 0x0) 06:52:24 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodisca']) [ 1346.787677][ T6369] BPF:, vararg [ 1346.796155][ T6369] BPF:) [ 1346.803656][ T6376] BPF: [ 1346.803656][ T6376] [ 1346.806628][ T6369] BPF: [ 1346.822898][ T6388] delete_channel: no stack [ 1346.829545][ T6369] BPF:Invalid arg#1 [ 1346.831137][ T6389] BPF:[1] FUNC_PROTO (anon) 06:52:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) [ 1346.838466][ T6388] delete_channel: no stack [ 1346.847478][ T6389] BPF:return=0 args=( [ 1346.852188][ T6369] BPF: [ 1346.852188][ T6369] [ 1346.860787][ T6389] BPF:0 (invalid-name-offset) 06:52:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEL_STATION(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) 06:52:24 executing program 5: r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f00000005c0)='ns/ipc\x00') [ 1346.889120][ T6389] BPF:, 0 (anon) [ 1346.899249][ T6395] BPF:[1] FUNC_PROTO (anon) [ 1346.907395][ T6389] BPF:, 3 (invalid-name-offset) [ 1346.938607][ T6396] jfs: Unrecognized mount option "nodisca" or missing value [ 1346.946388][ T6395] BPF:return=0 args=( [ 1346.953678][ T6389] BPF:) [ 1346.959254][ T6395] BPF:0 (invalid-name-offset) [ 1346.964449][ T6389] BPF: [ 1346.967988][ T6395] BPF:, vararg [ 1346.971701][ T6395] BPF:) [ 1346.974808][ T6395] BPF: [ 1346.980181][ T6395] BPF:Invalid arg#1 [ 1346.980452][ T6389] BPF:Invalid arg#1 06:52:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x26}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1346.984885][ T6395] BPF: [ 1346.984885][ T6395] [ 1346.998311][ T6389] BPF: [ 1346.998311][ T6389] 06:52:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) 06:52:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4800}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:24 executing program 5: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000140)={0x663112ff95f4d83c}, 0x18) 06:52:24 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grp']) 06:52:24 executing program 1: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) clone3(&(0x7f00000004c0)={0x20002400, 0x0, 0x0, 0x0, {}, &(0x7f0000000340)=""/39, 0x27, 0x0, &(0x7f0000000480)=[0x0], 0x1}, 0x58) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1347.118518][ T6418] BPF:[1] FUNC_PROTO (anon) [ 1347.131582][ T6418] BPF:return=0 args=( [ 1347.153335][ T6418] BPF:0 (invalid-name-offset) [ 1347.169090][ T6420] jfs: Unrecognized mount option "grp" or missing value [ 1347.184445][ T6423] BPF:[1] FUNC_PROTO (anon) [ 1347.205878][ T6418] BPF:, 0 (anon) [ 1347.214535][ T6423] BPF:return=0 args=( 06:52:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) 06:52:25 executing program 5: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) [ 1347.230831][ T6418] BPF:, 3 (invalid-name-offset) [ 1347.244275][ T6423] BPF:0 (invalid-name-offset) [ 1347.257124][ T6418] BPF:) [ 1347.271521][ T6423] BPF:, vararg [ 1347.275214][ T6418] BPF: 06:52:25 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grp']) [ 1347.285536][ T6418] BPF:Invalid arg#1 [ 1347.289886][ T6418] BPF: [ 1347.289886][ T6418] [ 1347.290259][ T6423] BPF:) [ 1347.304001][ T6434] BPF:[1] FUNC_PROTO (anon) [ 1347.324961][ T6423] BPF: [ 1347.330225][ T6434] BPF:return=0 args=( 06:52:25 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:25 executing program 1: clone3(&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000480)=[0x0], 0x1}, 0x58) [ 1347.335169][ T6423] BPF:Invalid arg#1 [ 1347.351296][ T6434] BPF:0 (invalid-name-offset) [ 1347.359399][ T6423] BPF: [ 1347.359399][ T6423] [ 1347.373992][ T6434] BPF:, 0 (anon) 06:52:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) [ 1347.383568][ T6434] BPF:, 3 (invalid-name-offset) [ 1347.393644][ T6439] BPF:[1] FUNC_PROTO (anon) [ 1347.416585][ T6434] BPF:) [ 1347.419911][ T6434] BPF: [ 1347.422664][ T6434] BPF:Invalid arg#1 [ 1347.426460][ T6434] BPF: [ 1347.426460][ T6434] 06:52:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x43}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1347.436676][ T6439] BPF:return=0 args=( [ 1347.440746][ T6439] BPF:0 (invalid-name-offset) [ 1347.449711][ T6442] jfs: Unrecognized mount option "grp" or missing value [ 1347.454222][ T6439] BPF:, vararg [ 1347.460676][ T6439] BPF:) [ 1347.465926][ T6439] BPF: [ 1347.472420][ T6439] BPF:Invalid arg#1 [ 1347.475600][ T6447] delete_channel: no stack [ 1347.479676][ T6439] BPF: [ 1347.479676][ T6439] 06:52:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4c00}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) [ 1347.502902][ T6447] delete_channel: no stack 06:52:25 executing program 5: pipe2$9p(&(0x7f0000000000), 0x80800) pipe2(&(0x7f0000000240), 0x0) 06:52:25 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grp']) [ 1347.561047][ T6453] delete_channel: no stack [ 1347.565819][ T6453] delete_channel: no stack 06:52:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) [ 1347.619225][ T6455] BPF:[1] FUNC_PROTO (anon) [ 1347.630490][ T6456] BPF:[1] FUNC_PROTO (anon) [ 1347.636715][ T6455] BPF:return=0 args=( [ 1347.652006][ T6456] BPF:return=0 args=( [ 1347.653149][ T6455] BPF:0 (invalid-name-offset) 06:52:25 executing program 5: pipe2$9p(0x0, 0x0) pipe2(&(0x7f0000000240), 0x0) [ 1347.673094][ T6456] BPF:0 (invalid-name-offset) [ 1347.675335][ T6455] BPF:, 0 (anon) [ 1347.690733][ T6456] BPF:, vararg [ 1347.694041][ T6461] jfs: Unrecognized mount option "grp" or missing value [ 1347.698901][ T6456] BPF:) [ 1347.706231][ T6456] BPF: [ 1347.709635][ T6456] BPF:Invalid arg#1 [ 1347.713534][ T6456] BPF: [ 1347.713534][ T6456] 06:52:25 executing program 1: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4fbadd96"}, 0x0, 0x0, @fd}) 06:52:25 executing program 5: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) [ 1347.720596][ T6455] BPF:, 3 (invalid-name-offset) [ 1347.741296][ T6464] delete_channel: no stack [ 1347.753219][ T6466] BPF:[1] FUNC_PROTO (anon) [ 1347.764273][ T6455] BPF:) [ 1347.767675][ T6464] delete_channel: no stack 06:52:25 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquo']) 06:52:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x6000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1347.772477][ T6466] BPF:return=0 args=( [ 1347.777031][ T6466] BPF:0 (invalid-name-offset) [ 1347.792366][ T6455] BPF: [ 1347.792400][ T6466] BPF:, vararg [ 1347.800353][ T6466] BPF:) [ 1347.803268][ T6466] BPF: [ 1347.806409][ T6466] BPF:Invalid arg#1 [ 1347.810562][ T6466] BPF: [ 1347.810562][ T6466] 06:52:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) [ 1347.839903][ T6455] BPF:Invalid arg#1 [ 1347.856618][ T6455] BPF: [ 1347.856618][ T6455] [ 1347.897881][ T6477] BPF:[1] FUNC_PROTO (anon) [ 1347.905129][ T6478] BPF:[1] FUNC_PROTO (anon) [ 1347.905209][ T6477] BPF:return=0 args=( [ 1347.914879][ T6480] delete_channel: no stack [ 1347.919700][ T6477] BPF:0 (invalid-name-offset) [ 1347.920786][ T6478] BPF:return=0 args=( [ 1347.924605][ T6480] delete_channel: no stack [ 1347.933044][ T6477] BPF:, 0 (anon) 06:52:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x48}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:25 executing program 5: clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, r0+10000000}, &(0x7f0000000400)={&(0x7f00000003c0), 0x8}) 06:52:25 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:52:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) [ 1347.941776][ T6479] jfs: Unrecognized mount option "grpquo" or missing value [ 1347.944231][ T6477] BPF:, 3 (invalid-name-offset) [ 1347.959303][ T6478] BPF:0 (invalid-name-offset) [ 1347.964280][ T6477] BPF:) [ 1347.967182][ T6477] BPF: [ 1347.970088][ T6477] BPF:Invalid arg#1 [ 1347.974066][ T6477] BPF: [ 1347.974066][ T6477] [ 1347.980822][ T6478] BPF:, vararg [ 1347.988532][ T6478] BPF:) [ 1347.992021][ T6478] BPF: 06:52:25 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquo']) [ 1347.995460][ T6478] BPF:Invalid arg#1 [ 1348.000312][ T6478] BPF: [ 1348.000312][ T6478] [ 1348.032045][ T6487] BPF:[1] FUNC_PROTO (anon) [ 1348.048952][ T6487] BPF:return=0 args=( [ 1348.053061][ T6487] BPF:0 (invalid-name-offset) [ 1348.074941][ T6487] BPF:, vararg [ 1348.083618][ T6493] delete_channel: no stack [ 1348.088074][ T6487] BPF:) 06:52:25 executing program 1: syz_open_dev$vcsu(0x0, 0x0, 0x0) 06:52:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x6800}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1348.095294][ T6496] BPF:[1] FUNC_PROTO (anon) [ 1348.099681][ T6487] BPF: [ 1348.102198][ T6493] delete_channel: no stack [ 1348.106206][ T6487] BPF:Invalid arg#1 [ 1348.115700][ T6497] jfs: Unrecognized mount option "grpquo" or missing value [ 1348.122067][ T6496] BPF:return=0 args=( [ 1348.125794][ T6487] BPF: [ 1348.125794][ T6487] [ 1348.143509][ T6496] BPF:0 (invalid-name-offset) 06:52:25 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquo']) 06:52:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) 06:52:26 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0) [ 1348.175996][ T6496] BPF:, 0 (anon) [ 1348.194889][ T6496] BPF:, 3 (invalid-name-offset) [ 1348.210179][ T6496] BPF:) [ 1348.220518][ T6496] BPF: [ 1348.229830][ T6496] BPF:Invalid arg#1 [ 1348.240519][ T6507] delete_channel: no stack [ 1348.241952][ T6508] BPF:[1] FUNC_PROTO (anon) [ 1348.255449][ T6496] BPF: [ 1348.255449][ T6496] [ 1348.256427][ T6511] jfs: Unrecognized mount option "grpquo" or missing value [ 1348.268021][ T6508] BPF:return=0 args=( [ 1348.272224][ T6508] BPF:0 (invalid-name-offset) 06:52:26 executing program 1: unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x200) [ 1348.277263][ T6508] BPF:, vararg [ 1348.279954][ T6507] delete_channel: no stack [ 1348.280824][ T6508] BPF:) [ 1348.288440][ T6508] BPF: [ 1348.291371][ T6508] BPF:Invalid arg#1 [ 1348.296035][ T6508] BPF: [ 1348.296035][ T6508] [ 1348.301596][ T6514] BPF:[1] FUNC_PROTO (anon) [ 1348.320800][ T6514] BPF:return=0 args=( 06:52:26 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquot']) [ 1348.329220][ T6515] BPF:[1] FUNC_PROTO (anon) [ 1348.336431][ T6515] BPF:return=0 args=( [ 1348.337846][ T6514] BPF:0 (invalid-name-offset) [ 1348.340716][ T6515] BPF:0 (invalid-name-offset) [ 1348.359207][ T6514] BPF:, 0 (anon) [ 1348.379546][ T6515] BPF:, vararg [ 1348.382103][ T6514] BPF:, 3 (invalid-name-offset) [ 1348.383504][ T6515] BPF:) [ 1348.395576][ T6515] BPF: [ 1348.401958][ T6515] BPF:Invalid arg#1 [ 1348.404913][ T6514] BPF:) [ 1348.409639][ T6515] BPF: [ 1348.409639][ T6515] [ 1348.421000][ T6514] BPF: [ 1348.422195][ T6521] jfs: Unrecognized mount option "grpquot" or missing value 06:52:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4c}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1348.433572][ T6514] BPF:Invalid arg#1 [ 1348.449044][ T6514] BPF: [ 1348.449044][ T6514] [ 1348.512510][ T6527] BPF:[1] FUNC_PROTO (anon) [ 1348.517457][ T6527] BPF:return=0 args=( [ 1348.521640][ T6527] BPF:0 (invalid-name-offset) [ 1348.526418][ T6527] BPF:, 0 (anon) [ 1348.532243][ T6527] BPF:, 3 (invalid-name-offset) [ 1348.537544][ T6527] BPF:) [ 1348.540406][ T6527] BPF: [ 1348.543359][ T6527] BPF:Invalid arg#1 [ 1348.549158][ T6527] BPF: [ 1348.549158][ T6527] [ 1348.572427][ T6530] BPF:[1] FUNC_PROTO (anon) [ 1348.582981][ T6530] BPF:return=0 args=( [ 1348.591689][ T6530] BPF:0 (invalid-name-offset) [ 1348.597874][ T6530] BPF:, 0 (anon) [ 1348.601507][ T6530] BPF:, 3 (invalid-name-offset) [ 1348.606397][ T6530] BPF:) [ 1348.612337][ T6530] BPF: [ 1348.615226][ T6530] BPF:Invalid arg#1 [ 1348.619715][ T6530] BPF: [ 1348.619715][ T6530] 06:52:26 executing program 5: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) 06:52:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) 06:52:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x6c00}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:26 executing program 1: clock_gettime(0x0, &(0x7f0000000180)={0x0}) pselect6(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000380)={r0}, 0x0) 06:52:26 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquot']) 06:52:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x60}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1348.983700][ T6540] delete_channel: no stack [ 1348.990789][ T6540] delete_channel: no stack [ 1349.000183][ T6542] BPF:[1] FUNC_PROTO (anon) [ 1349.000380][ T6543] BPF:[1] FUNC_PROTO (anon) [ 1349.011469][ T6542] BPF:return=0 args=( [ 1349.015118][ T6544] jfs: Unrecognized mount option "grpquot" or missing value [ 1349.020413][ T6542] BPF:0 (invalid-name-offset) [ 1349.027696][ T6542] BPF:, 0 (anon) 06:52:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) [ 1349.031266][ T6542] BPF:, 3 (invalid-name-offset) [ 1349.036193][ T6542] BPF:) [ 1349.039255][ T6542] BPF: [ 1349.042019][ T6542] BPF:Invalid arg#1 [ 1349.045730][ T6543] BPF:return=0 args=( [ 1349.045810][ T6542] BPF: [ 1349.045810][ T6542] 06:52:26 executing program 5: clone3(&(0x7f00000004c0)={0x20002400, 0x0, 0x0, 0x0, {}, &(0x7f0000000340)=""/39, 0x27, 0x0, &(0x7f0000000480)=[0x0], 0x1}, 0x58) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1349.107393][ T6550] BPF:[1] FUNC_PROTO (anon) [ 1349.136300][ T6553] delete_channel: no stack [ 1349.150500][ T6550] BPF:return=0 args=( [ 1349.168929][ T6550] BPF:0 (invalid-name-offset) [ 1349.169028][ T6543] BPF:0 (invalid-name-offset) [ 1349.181938][ T6550] BPF:, 0 (anon) 06:52:27 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquot']) [ 1349.184023][ T6553] delete_channel: no stack 06:52:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) [ 1349.209507][ T6550] BPF:, 3 (invalid-name-offset) [ 1349.217872][ T6550] BPF:) [ 1349.220832][ T6543] BPF:, vararg [ 1349.224058][ T6550] BPF: [ 1349.232184][ T6550] BPF:Invalid arg#1 [ 1349.234711][ T6543] BPF:) [ 1349.243077][ T6550] BPF: [ 1349.243077][ T6550] [ 1349.254258][ T6543] BPF: 06:52:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x68}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1349.276899][ T6543] BPF:Invalid arg#1 [ 1349.279933][ T6558] jfs: Unrecognized mount option "grpquot" or missing value [ 1349.281082][ T6543] BPF: [ 1349.281082][ T6543] [ 1349.303406][ T6561] BPF:[1] FUNC_PROTO (anon) [ 1349.323076][ T6561] BPF:return=0 args=( 06:52:27 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) [ 1349.347133][ T6563] delete_channel: no stack [ 1349.355016][ T6563] delete_channel: no stack [ 1349.356790][ T6561] BPF:0 (invalid-name-offset) [ 1349.379213][ T6567] BPF:[1] FUNC_PROTO (anon) [ 1349.386354][ T6561] BPF:, vararg [ 1349.392697][ T6567] BPF:return=0 args=( 06:52:27 executing program 5: clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000380)={0x0, r0+10000000}, 0x0) 06:52:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) [ 1349.400246][ T6567] BPF:0 (invalid-name-offset) [ 1349.412417][ T6567] BPF:, 0 (anon) [ 1349.416182][ T6567] BPF:, 3 (invalid-name-offset) [ 1349.419466][ T6561] BPF:) [ 1349.440923][ T6561] BPF: [ 1349.449747][ T6570] jfs: Unrecognized mount option "gid=" or missing value [ 1349.457121][ T6561] BPF:Invalid arg#1 [ 1349.459214][ T6567] BPF:) [ 1349.467665][ T6567] BPF: [ 1349.471353][ T6567] BPF:Invalid arg#1 [ 1349.475591][ T6567] BPF: [ 1349.475591][ T6567] [ 1349.479004][ T6561] BPF: [ 1349.479004][ T6561] [ 1349.496463][ T6575] BPF:[1] FUNC_PROTO (anon) [ 1349.502153][ T6576] delete_channel: no stack [ 1349.515426][ T6576] delete_channel: no stack [ 1349.524690][ T6575] BPF:return=0 args=( [ 1349.539082][ T6575] BPF:0 (invalid-name-offset) 06:52:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7400}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1349.553203][ T6575] BPF:, 0 (anon) [ 1349.561367][ T6575] BPF:, 3 (invalid-name-offset) [ 1349.573345][ T6575] BPF:) [ 1349.581039][ T6575] BPF: [ 1349.586216][ T6575] BPF:Invalid arg#1 [ 1349.596331][ T6581] BPF:[1] FUNC_PROTO (anon) [ 1349.596593][ T6575] BPF: [ 1349.596593][ T6575] [ 1349.602065][ T6581] BPF:return=0 args=( [ 1349.610317][ T6581] BPF:0 (invalid-name-offset) [ 1349.615728][ T6581] BPF:, vararg [ 1349.619602][ T6581] BPF:) [ 1349.622775][ T6581] BPF: [ 1349.625897][ T6581] BPF:Invalid arg#1 [ 1349.630787][ T6581] BPF: [ 1349.630787][ T6581] [ 1349.639258][ T6583] BPF:[1] FUNC_PROTO (anon) [ 1349.644180][ T6583] BPF:return=0 args=( [ 1349.648571][ T6583] BPF:0 (invalid-name-offset) [ 1349.653587][ T6583] BPF:, vararg [ 1349.657398][ T6583] BPF:) [ 1349.660475][ T6583] BPF: [ 1349.663429][ T6583] BPF:Invalid arg#1 [ 1349.667710][ T6583] BPF: [ 1349.667710][ T6583] 06:52:27 executing program 1: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x1c1f00, 0x0) 06:52:27 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) 06:52:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) 06:52:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x6c}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7a00}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:27 executing program 5: syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 1349.971611][ T6599] BPF:[1] FUNC_PROTO (anon) [ 1349.976642][ T6601] BPF:[1] FUNC_PROTO (anon) [ 1349.979137][ T6597] jfs: Unrecognized mount option "gid=" or missing value [ 1349.989995][ T6602] delete_channel: no stack [ 1349.994964][ T6602] delete_channel: no stack [ 1350.017150][ T6599] BPF:return=0 args=( 06:52:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) [ 1350.017302][ T6601] BPF:return=0 args=( [ 1350.030585][ T6599] BPF:0 (invalid-name-offset) [ 1350.039376][ T6599] BPF:, vararg [ 1350.043123][ T6599] BPF:) [ 1350.046162][ T6599] BPF: [ 1350.051715][ T6599] BPF:Invalid arg#1 [ 1350.056390][ T6599] BPF: [ 1350.056390][ T6599] [ 1350.062299][ T6601] BPF:0 (invalid-name-offset) 06:52:27 executing program 1: clone3(&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000480)=[0x0], 0x1}, 0x58) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vcsa\x00', 0x0, 0x0) 06:52:27 executing program 5: linkat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0, 0x2400) [ 1350.070563][ T6601] BPF:, 0 (anon) [ 1350.076170][ T6601] BPF:, 3 (invalid-name-offset) [ 1350.076307][ T6606] BPF:[1] FUNC_PROTO (anon) [ 1350.081438][ T6601] BPF:) [ 1350.090642][ T6601] BPF: [ 1350.101925][ T6601] BPF:Invalid arg#1 [ 1350.105493][ T6606] BPF:return=0 args=( [ 1350.110309][ T6601] BPF: [ 1350.110309][ T6601] 06:52:27 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid=', @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) [ 1350.134799][ T6606] BPF:0 (invalid-name-offset) [ 1350.155875][ T6610] delete_channel: no stack [ 1350.161540][ T6609] BPF:[1] FUNC_PROTO (anon) [ 1350.162247][ T6610] delete_channel: no stack [ 1350.166595][ T6606] BPF:, vararg [ 1350.188788][ T6609] BPF:return=0 args=( [ 1350.194657][ T6606] BPF:) 06:52:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) [ 1350.204418][ T6606] BPF: [ 1350.208576][ T6609] BPF:0 (invalid-name-offset) [ 1350.219322][ T6606] BPF:Invalid arg#1 [ 1350.230148][ T6609] BPF:, 0 (anon) [ 1350.236211][ T6606] BPF: [ 1350.236211][ T6606] [ 1350.247644][ T6609] BPF:, 3 (invalid-name-offset) 06:52:28 executing program 5: io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0) 06:52:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xa000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1350.263839][ T6617] jfs: Unrecognized mount option "gid=" or missing value 06:52:28 executing program 5: clock_gettime(0x7, &(0x7f0000001380)) [ 1350.335123][ T6609] BPF:) 06:52:28 executing program 1: openat$incfs(0xffffffffffffffff, &(0x7f0000000c80)='.log\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000580)='ns/time\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/ipc\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup/syz0\x00', 0x200002, 0x0) [ 1350.355524][ T6609] BPF: [ 1350.369396][ T6609] BPF:Invalid arg#1 [ 1350.393543][ T6626] delete_channel: no stack [ 1350.423827][ T6609] BPF: [ 1350.423827][ T6609] [ 1350.433643][ T6626] delete_channel: no stack [ 1350.444923][ T6630] BPF:[1] FUNC_PROTO (anon) [ 1350.468435][ T6630] BPF:return=0 args=( 06:52:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x74}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:28 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) 06:52:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) 06:52:28 executing program 5: pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x7f9}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={[0x9]}, 0x8}) [ 1350.490833][ T6630] BPF:0 (invalid-name-offset) [ 1350.496376][ T6630] BPF:, vararg [ 1350.501939][ T6630] BPF:) [ 1350.506760][ T6630] BPF: [ 1350.539914][ T6630] BPF:Invalid arg#1 06:52:28 executing program 1: pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x7f9}, 0x0, 0x0) [ 1350.562534][ T6630] BPF: [ 1350.562534][ T6630] [ 1350.570478][ T6639] delete_channel: no stack [ 1350.584236][ T6639] delete_channel: no stack [ 1350.592555][ T6641] BPF:[1] FUNC_PROTO (anon) [ 1350.607369][ T6643] BPF:[1] FUNC_PROTO (anon) 06:52:28 executing program 5: pselect6(0x40, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000380), &(0x7f0000000400)={&(0x7f00000003c0), 0x8}) [ 1350.612577][ T6642] jfs: Unrecognized mount option "0x0000000000000000" or missing value [ 1350.621163][ T6641] BPF:return=0 args=( [ 1350.625018][ T6643] BPF:return=0 args=( [ 1350.636212][ T6643] BPF:0 (invalid-name-offset) [ 1350.648544][ T6641] BPF:0 (invalid-name-offset) [ 1350.656683][ T6643] BPF:, vararg 06:52:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) socketpair(0x22, 0x2, 0x24, &(0x7f00000001c0)) 06:52:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xfffff}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1350.661219][ T6641] BPF:, 0 (anon) [ 1350.666365][ T6643] BPF:) [ 1350.669372][ T6643] BPF: [ 1350.672355][ T6643] BPF:Invalid arg#1 [ 1350.676290][ T6643] BPF: [ 1350.676290][ T6643] [ 1350.685653][ T6641] BPF:, 3 (invalid-name-offset) [ 1350.697383][ T6641] BPF:) 06:52:28 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) 06:52:28 executing program 1: ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f00000001c0)={0x0}) socketpair(0x25, 0x0, 0x0, &(0x7f0000001240)) [ 1350.712581][ T6641] BPF: [ 1350.721860][ T6641] BPF:Invalid arg#1 [ 1350.736978][ T6641] BPF: [ 1350.736978][ T6641] [ 1350.754824][ T6654] delete_channel: no stack 06:52:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x2, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={r8, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) [ 1350.761098][ T6656] BPF:[1] FUNC_PROTO (anon) [ 1350.766158][ T6654] delete_channel: no stack [ 1350.771238][ T6656] BPF:return=0 args=( [ 1350.781445][ T6655] BPF:[1] FUNC_PROTO (anon) [ 1350.784726][ T6656] BPF:0 (invalid-name-offset) [ 1350.804308][ T6655] BPF:return=0 args=( 06:52:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x0, 0x2, 0x24, &(0x7f00000001c0)) [ 1350.815285][ T6655] BPF:0 (invalid-name-offset) [ 1350.817777][ T6656] BPF:, 0 (anon) [ 1350.831602][ T6656] BPF:, 3 (invalid-name-offset) [ 1350.832026][ T6655] BPF:, vararg [ 1350.844351][ T6659] jfs: Unrecognized mount option "0x0000000000000000" or missing value [ 1350.859364][ T6656] BPF:) [ 1350.862907][ T6655] BPF:) [ 1350.875990][ T6656] BPF: [ 1350.879565][ T6655] BPF: [ 1350.893058][ T6656] BPF:Invalid arg#1 [ 1350.908046][ T6655] BPF:Invalid arg#1 06:52:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x7a}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 06:52:28 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) [ 1350.924267][ T6666] device batadv_slave_1 entered promiscuous mode [ 1350.936637][ T6656] BPF: [ 1350.936637][ T6656] [ 1350.945732][ T6655] BPF: [ 1350.945732][ T6655] [ 1350.985400][ T6671] BPF:[1] FUNC_PROTO (anon) 06:52:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x0, 0x2, 0x24, &(0x7f00000001c0)) [ 1351.006250][ T6671] BPF:return=0 args=( [ 1351.018949][ T6680] BPF:[1] FUNC_PROTO (anon) [ 1351.023191][ T6671] BPF:0 (invalid-name-offset) [ 1351.030718][ T6660] device batadv_slave_1 left promiscuous mode [ 1351.040862][ T6671] BPF:, vararg [ 1351.042366][ T6678] jfs: Unrecognized mount option "0x0000000000000000" or missing value [ 1351.052515][ T6671] BPF:) 06:52:28 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 1351.052530][ T6671] BPF: [ 1351.052538][ T6671] BPF:Invalid arg#1 [ 1351.052543][ T6671] BPF: [ 1351.052543][ T6671] [ 1351.074921][ T6680] BPF:return=0 args=( 06:52:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1351.100161][ T6666] device batadv_slave_1 entered promiscuous mode [ 1351.119570][ T6680] BPF:0 (invalid-name-offset) [ 1351.124864][ T6660] device batadv_slave_1 left promiscuous mode 06:52:29 executing program 1: read$sequencer(0xffffffffffffffff, 0x0, 0x0) [ 1351.151116][ T6680] BPF:, 0 (anon) [ 1351.151153][ T6693] BPF:[1] FUNC_PROTO (anon) [ 1351.159950][ T6693] BPF:return=0 args=( [ 1351.164290][ T6693] BPF:0 (invalid-name-offset) [ 1351.166598][ T6680] BPF:, 3 (invalid-name-offset) [ 1351.173252][ T6693] BPF:, vararg [ 1351.179555][ T6693] BPF:) [ 1351.182600][ T6693] BPF: [ 1351.185551][ T6693] BPF:Invalid arg#1 [ 1351.190410][ T6693] BPF: [ 1351.190410][ T6693] 06:52:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x2, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={r8, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) [ 1351.200423][ T6695] BPF:[1] FUNC_PROTO (anon) [ 1351.205391][ T6695] BPF:return=0 args=( [ 1351.209910][ T6695] BPF:0 (invalid-name-offset) [ 1351.213062][ T6680] BPF:) [ 1351.214856][ T6695] BPF:, vararg [ 1351.222948][ T6695] BPF:) [ 1351.225893][ T6695] BPF: [ 1351.229637][ T6695] BPF:Invalid arg#1 [ 1351.233836][ T6695] BPF: [ 1351.233836][ T6695] [ 1351.240317][ T6680] BPF: 06:52:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x0, 0x2, 0x24, &(0x7f00000001c0)) 06:52:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x2000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1351.253680][ T6680] BPF:Invalid arg#1 06:52:29 executing program 1: syz_open_dev$vcsu(&(0x7f0000000540)='/dev/vcsu#\x00', 0x0, 0x0) [ 1351.292786][ T6680] BPF: [ 1351.292786][ T6680] 06:52:29 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) [ 1351.348742][ T6703] BPF:[1] FUNC_PROTO (anon) [ 1351.349251][ T6705] BPF:[1] FUNC_PROTO (anon) [ 1351.356615][ T6702] device batadv_slave_1 entered promiscuous mode [ 1351.381558][ T6703] BPF:return=0 args=( [ 1351.390482][ T6703] BPF:0 (invalid-name-offset) [ 1351.390546][ T6705] BPF:return=0 args=( [ 1351.398248][ T6703] BPF:, vararg [ 1351.403232][ T6703] BPF:) [ 1351.417162][ T6703] BPF: [ 1351.420374][ T6703] BPF:Invalid arg#1 [ 1351.423642][ T6711] jfs: Unrecognized mount option "0x0000000000000000" or missing value [ 1351.424569][ T6703] BPF: [ 1351.424569][ T6703] [ 1351.443175][ T6705] BPF:0 (invalid-name-offset) [ 1351.448694][ T6718] BPF:[1] FUNC_PROTO (anon) [ 1351.454314][ T6705] BPF:, 0 (anon) [ 1351.458670][ T6705] BPF:, 3 (invalid-name-offset) [ 1351.463630][ T6697] device batadv_slave_1 left promiscuous mode [ 1351.464022][ T6705] BPF:) [ 1351.473230][ T6705] BPF: [ 1351.476768][ T6705] BPF:Invalid arg#1 [ 1351.481142][ T6705] BPF: [ 1351.481142][ T6705] [ 1351.483685][ T6718] BPF:return=0 args=( 06:52:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xa0}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x0, 0x24, &(0x7f00000001c0)) 06:52:29 executing program 1: pselect6(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000380), 0x0) [ 1351.501922][ T6718] BPF:0 (invalid-name-offset) 06:52:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x2, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={r8, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) [ 1351.527262][ T6718] BPF:, vararg 06:52:29 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) [ 1351.548434][ T6718] BPF:) [ 1351.556684][ T6718] BPF: [ 1351.573738][ T6718] BPF:Invalid arg#1 [ 1351.592602][ T6718] BPF: [ 1351.592602][ T6718] 06:52:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x0, 0x24, &(0x7f00000001c0)) 06:52:29 executing program 1: r0 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000580)='/sys/kernel/mm/transparent_hugepage/khugepaged/scan_sleep_millisecs\x00', 0x1, 0x0) write$khugepaged_scan(r0, 0x0, 0x0) [ 1351.624755][ T6729] BPF:[1] FUNC_PROTO (anon) [ 1351.640020][ T6727] device batadv_slave_1 entered promiscuous mode [ 1351.655026][ T6729] BPF:return=0 args=( [ 1351.660079][ T6729] BPF:0 (invalid-name-offset) [ 1351.663964][ T6732] jfs: Unrecognized mount option "0x0000000000000000" or missing value 06:52:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1351.670391][ T6729] BPF:, 0 (anon) [ 1351.682681][ T6729] BPF:, 3 (invalid-name-offset) [ 1351.693407][ T6729] BPF:) [ 1351.700008][ T6729] BPF: [ 1351.706720][ T6729] BPF:Invalid arg#1 [ 1351.713859][ T6729] BPF: [ 1351.713859][ T6729] [ 1351.723530][ T6738] BPF:[1] FUNC_PROTO (anon) [ 1351.728621][ T6738] BPF:return=0 args=( [ 1351.733544][ T6738] BPF:0 (invalid-name-offset) [ 1351.739070][ T6738] BPF:, vararg [ 1351.739774][ T6739] BPF:[1] FUNC_PROTO (anon) [ 1351.742869][ T6738] BPF:) [ 1351.750258][ T6738] BPF: [ 1351.753763][ T6738] BPF:Invalid arg#1 [ 1351.758095][ T6738] BPF: [ 1351.758095][ T6738] 06:52:29 executing program 1: openat$autofs(0xffffff9c, &(0x7f0000000c80)='/dev/autofs\x00', 0x80200, 0x0) 06:52:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x0, 0x24, &(0x7f00000001c0)) [ 1351.783798][ T6739] BPF:return=0 args=( [ 1351.799369][ T6739] BPF:0 (invalid-name-offset) [ 1351.806418][ T6723] device batadv_slave_1 left promiscuous mode [ 1351.812007][ T6739] BPF:, 0 (anon) [ 1351.815110][ T6745] BPF:[1] FUNC_PROTO (anon) [ 1351.823936][ T6739] BPF:, 3 (invalid-name-offset) 06:52:29 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) 06:52:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x2, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={r8, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) [ 1351.837064][ T6745] BPF:return=0 args=( [ 1351.851987][ T6745] BPF:0 (invalid-name-offset) [ 1351.856376][ T6739] BPF:) [ 1351.871039][ T6745] BPF:, vararg [ 1351.872140][ T6739] BPF: [ 1351.888172][ T6739] BPF:Invalid arg#1 [ 1351.895196][ T6745] BPF:) [ 1351.905191][ T6745] BPF: [ 1351.910205][ T6739] BPF: [ 1351.910205][ T6739] [ 1351.915020][ T6745] BPF:Invalid arg#1 [ 1351.926787][ T6745] BPF: [ 1351.926787][ T6745] 06:52:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x300}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:29 executing program 1: clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x7f9}, &(0x7f0000000380)={0x0, r0+10000000}, &(0x7f0000000400)={&(0x7f00000003c0)={[0x9]}, 0x8}) 06:52:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x0, &(0x7f00000001c0)) 06:52:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1351.942715][ T6754] jfs: Unrecognized mount option "0x0000000000000000" or missing value [ 1351.981851][ T6756] device batadv_slave_1 entered promiscuous mode 06:52:29 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gi', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) 06:52:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x0, &(0x7f00000001c0)) [ 1352.045204][ T6766] BPF:[1] FUNC_PROTO (anon) [ 1352.060416][ T6770] BPF:[1] FUNC_PROTO (anon) [ 1352.060441][ T6766] BPF:return=0 args=( [ 1352.082086][ T6766] BPF:0 (invalid-name-offset) [ 1352.089416][ T6766] BPF:, 0 (anon) 06:52:29 executing program 1: io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040), 0x8}) [ 1352.093110][ T6753] device batadv_slave_1 left promiscuous mode [ 1352.097158][ T6772] jfs: Unrecognized mount option "gi0x0000000000000000" or missing value [ 1352.101240][ T6770] BPF:return=0 args=( [ 1352.109820][ T6766] BPF:, 3 (invalid-name-offset) [ 1352.117692][ T6766] BPF:) [ 1352.120971][ T6766] BPF: [ 1352.123968][ T6766] BPF:Invalid arg#1 [ 1352.140897][ T6770] BPF:0 (invalid-name-offset) [ 1352.145688][ T6770] BPF:, vararg [ 1352.149462][ T6770] BPF:) [ 1352.152240][ T6770] BPF: [ 1352.155022][ T6770] BPF:Invalid arg#1 [ 1352.156056][ T6766] BPF: [ 1352.156056][ T6766] [ 1352.159413][ T6770] BPF: [ 1352.159413][ T6770] 06:52:29 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gi', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) 06:52:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) [ 1352.188202][ T6779] BPF:[1] FUNC_PROTO (anon) [ 1352.199688][ T6779] BPF:return=0 args=( [ 1352.204453][ T6779] BPF:0 (invalid-name-offset) [ 1352.214982][ T6781] BPF:[1] FUNC_PROTO (anon) [ 1352.229215][ T6779] BPF:, vararg 06:52:30 executing program 1: io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={&(0x7f0000000040)={[0x7fffffff]}, 0x8}) [ 1352.236167][ T6781] BPF:return=0 args=( [ 1352.243311][ T6779] BPF:) [ 1352.251899][ T6781] BPF:0 (invalid-name-offset) [ 1352.257915][ T6779] BPF: [ 1352.269335][ T6779] BPF:Invalid arg#1 [ 1352.275982][ T6781] BPF:, 0 (anon) [ 1352.286090][ T6779] BPF: 06:52:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x0, &(0x7f00000001c0)) [ 1352.286090][ T6779] [ 1352.292189][ T6781] BPF:, 3 (invalid-name-offset) [ 1352.303350][ T6785] jfs: Unrecognized mount option "gi0x0000000000000000" or missing value [ 1352.314509][ T6781] BPF:) [ 1352.325778][ T6781] BPF: [ 1352.333351][ T6781] BPF:Invalid arg#1 06:52:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x500}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1352.341967][ T6781] BPF: [ 1352.341967][ T6781] 06:52:30 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gi', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) 06:52:30 executing program 1: pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x7f9}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0), 0x8}) 06:52:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) 06:52:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, 0x0) [ 1352.464616][ T6802] BPF:[1] FUNC_PROTO (anon) [ 1352.480800][ T6802] BPF:return=0 args=( [ 1352.484867][ T6803] BPF:[1] FUNC_PROTO (anon) [ 1352.492630][ T6804] jfs: Unrecognized mount option "gi0x0000000000000000" or missing value [ 1352.500557][ T6803] BPF:return=0 args=( [ 1352.511238][ T6802] BPF:0 (invalid-name-offset) [ 1352.536602][ T6803] BPF:0 (invalid-name-offset) [ 1352.542149][ T6802] BPF:, vararg [ 1352.546363][ T6803] BPF:, 0 (anon) [ 1352.551028][ T6802] BPF:) [ 1352.554589][ T6803] BPF:, 3 (invalid-name-offset) [ 1352.560290][ T6803] BPF:) [ 1352.563593][ T6802] BPF: [ 1352.563864][ T6803] BPF: [ 1352.570116][ T6803] BPF:Invalid arg#1 [ 1352.575050][ T6802] BPF:Invalid arg#1 [ 1352.575108][ T6803] BPF: [ 1352.575108][ T6803] 06:52:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000940)={&(0x7f0000000880), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14}, 0x14}}, 0x0) 06:52:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, 0x0) [ 1352.584715][ T6802] BPF: [ 1352.584715][ T6802] 06:52:30 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) [ 1352.614267][ T6819] BPF:[1] FUNC_PROTO (anon) [ 1352.621974][ T6819] BPF:return=0 args=( [ 1352.626223][ T6802] BPF:[1] FUNC_PROTO (anon) [ 1352.634535][ T6802] BPF:return=0 args=( [ 1352.636168][ T6819] BPF:0 (invalid-name-offset) [ 1352.650866][ T6819] BPF:, 0 (anon) [ 1352.658369][ T6802] BPF:0 (invalid-name-offset) 06:52:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) [ 1352.675909][ T6802] BPF:, vararg [ 1352.684380][ T6819] BPF:, 3 (invalid-name-offset) [ 1352.684574][ T6802] BPF:) [ 1352.698676][ T6819] BPF:) [ 1352.708926][ T6819] BPF: [ 1352.717546][ T6819] BPF:Invalid arg#1 [ 1352.723182][ T6802] BPF: 06:52:30 executing program 1: mq_open(0x0, 0x0, 0x0, &(0x7f0000000040)) 06:52:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x22, 0x2, 0x24, 0x0) [ 1352.729822][ T6819] BPF: [ 1352.729822][ T6819] [ 1352.738256][ T6802] BPF:Invalid arg#1 [ 1352.750829][ T6827] jfs: Unrecognized mount option "gid0x0000000000000000" or missing value [ 1352.769432][ T6802] BPF: [ 1352.769432][ T6802] 06:52:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x6000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x600}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:30 executing program 1: openat$ttyS3(0xffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4182, 0x0) 06:52:30 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) [ 1352.865798][ T6840] BPF:[1] FUNC_PROTO (anon) [ 1352.871009][ T6840] BPF:return=0 args=( [ 1352.875474][ T6840] BPF:0 (invalid-name-offset) [ 1352.880927][ T6840] BPF:, vararg [ 1352.884842][ T6840] BPF:) [ 1352.891304][ T6841] BPF:[1] FUNC_PROTO (anon) [ 1352.905914][ T6840] BPF: [ 1352.912414][ T6840] BPF:Invalid arg#1 06:52:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={0x0, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) [ 1352.921150][ T6841] BPF:return=0 args=( [ 1352.926024][ T6840] BPF: [ 1352.926024][ T6840] [ 1352.934829][ T6841] BPF:0 (invalid-name-offset) [ 1352.953541][ T6841] BPF:, 0 (anon) [ 1352.961310][ T6848] BPF:[1] FUNC_PROTO (anon) 06:52:30 executing program 0: ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) syz_genetlink_get_family_id$gtp(&(0x7f0000000380)='gtp\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 06:52:30 executing program 1: r0 = openat$autofs(0xffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000680)='gtp\x00', r0) [ 1352.984322][ T6848] BPF:return=0 args=( [ 1352.984690][ T6841] BPF:, 3 (invalid-name-offset) [ 1352.989566][ T6848] BPF:0 (invalid-name-offset) [ 1353.005713][ T6849] jfs: Unrecognized mount option "gid0x0000000000000000" or missing value [ 1353.012109][ T6841] BPF:) [ 1353.025446][ T6841] BPF: [ 1353.032942][ T6841] BPF:Invalid arg#1 [ 1353.041757][ T6841] BPF: [ 1353.041757][ T6841] [ 1353.047571][ T6848] BPF:, vararg [ 1353.051241][ T6848] BPF:) [ 1353.054315][ T6848] BPF: [ 1353.058607][ T6848] BPF:Invalid arg#1 [ 1353.059057][ T6856] BPF:[1] FUNC_PROTO (anon) [ 1353.062752][ T6848] BPF: [ 1353.062752][ T6848] [ 1353.076828][ T6856] BPF:return=0 args=( 06:52:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x700}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1353.081136][ T6856] BPF:0 (invalid-name-offset) [ 1353.086064][ T6856] BPF:, 0 (anon) [ 1353.091193][ T6856] BPF:, 3 (invalid-name-offset) [ 1353.097117][ T6856] BPF:) [ 1353.100264][ T6856] BPF: [ 1353.103262][ T6856] BPF:Invalid arg#1 [ 1353.109264][ T6856] BPF: [ 1353.109264][ T6856] 06:52:30 executing program 3: syz_mount_image$jfs(&(0x7f0000000d40)='jfs\x00', &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='gid', @ANYRESHEX=0x0, @ANYBLOB=',iocharset=cp1255,nodiscard,nodiscard,grpquota']) 06:52:30 executing program 1: socketpair(0xa, 0x0, 0x0, &(0x7f00000004c0)) 06:52:31 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000480)) 06:52:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={0x0, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) [ 1353.206648][ T6869] BPF:[1] FUNC_PROTO (anon) [ 1353.218527][ T6869] BPF:return=0 args=( [ 1353.234505][ T6869] BPF:0 (invalid-name-offset) [ 1353.255167][ T6874] BPF:[1] FUNC_PROTO (anon) [ 1353.258088][ T6869] BPF:, vararg [ 1353.267782][ T6869] BPF:) [ 1353.273032][ T6872] jfs: Unrecognized mount option "gid0x0000000000000000" or missing value [ 1353.282164][ T6874] BPF:return=0 args=( [ 1353.284912][ T6869] BPF: [ 1353.289331][ T6869] BPF:Invalid arg#1 [ 1353.295224][ T6869] BPF: [ 1353.295224][ T6869] [ 1353.300553][ T6874] BPF:0 (invalid-name-offset) [ 1353.305334][ T6874] BPF:, 0 (anon) [ 1353.309695][ T6874] BPF:, 3 (invalid-name-offset) [ 1353.310053][ T6880] BPF:[1] FUNC_PROTO (anon) [ 1353.314911][ T6874] BPF:) [ 1353.322172][ T6874] BPF: [ 1353.324928][ T6874] BPF:Invalid arg#1 [ 1353.328776][ T6874] BPF: [ 1353.328776][ T6874] [ 1353.333894][ T6880] BPF:return=0 args=( [ 1353.340172][ T6880] BPF:0 (invalid-name-offset) [ 1353.348952][ T6882] BPF:[1] FUNC_PROTO (anon) [ 1353.355678][ T6880] BPF:, vararg [ 1353.359762][ T6880] BPF:) [ 1353.362561][ T6880] BPF: [ 1353.363676][ T6882] BPF:return=0 args=( [ 1353.366434][ T6880] BPF:Invalid arg#1 [ 1353.390201][ T6880] BPF: [ 1353.390201][ T6880] 06:52:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x8000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:31 executing program 3: openat$autofs(0xffffff9c, &(0x7f0000000800)='/dev/autofs\x00', 0x0, 0x0) 06:52:31 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00', 0xffffffffffffffff) 06:52:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) [ 1353.421154][ T6882] BPF:0 (invalid-name-offset) [ 1353.425911][ T6882] BPF:, 0 (anon) [ 1353.449300][ T6882] BPF:, 3 (invalid-name-offset) [ 1353.457232][ T6882] BPF:) [ 1353.463316][ T6882] BPF: [ 1353.473477][ T6882] BPF:Invalid arg#1 [ 1353.491790][ T6882] BPF: [ 1353.491790][ T6882] [ 1353.500282][ T6896] BPF:[1] FUNC_PROTO (anon) 06:52:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={0x0, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) 06:52:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x900}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:31 executing program 1: openat$userio(0xffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) [ 1353.547539][ T6896] BPF:return=0 args=( [ 1353.562635][ T6896] BPF:0 (invalid-name-offset) [ 1353.575045][ T6896] BPF:, vararg [ 1353.585824][ T6896] BPF:) 06:52:31 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000300)={'virt_wifi0\x00', @ifru_ivalue}) 06:52:31 executing program 3: sigaltstack(&(0x7f0000ff9000/0x2000)=nil, 0x0) madvise(&(0x7f0000ff6000/0xa000)=nil, 0xa000, 0x4) [ 1353.600795][ T6896] BPF: [ 1353.605465][ T6896] BPF:Invalid arg#1 [ 1353.622866][ T6896] BPF: [ 1353.622866][ T6896] [ 1353.665111][ T6909] BPF:[1] FUNC_PROTO (anon) 06:52:31 executing program 1: socket(0x7e, 0x0, 0x0) [ 1353.685569][ T6909] BPF:return=0 args=( [ 1353.696974][ T6909] BPF:0 (invalid-name-offset) [ 1353.708911][ T6912] BPF:[1] FUNC_PROTO (anon) [ 1353.721062][ T6909] BPF:, vararg [ 1353.725275][ T6909] BPF:) [ 1353.725825][ T6912] BPF:return=0 args=( [ 1353.733513][ T6909] BPF: [ 1353.742300][ T6909] BPF:Invalid arg#1 [ 1353.744779][ T6912] BPF:0 (invalid-name-offset) [ 1353.755223][ T6909] BPF: [ 1353.755223][ T6909] 06:52:31 executing program 3: ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000040)) openat$ttyprintk(0xffffff9c, &(0x7f0000000300)='/dev/ttyprintk\x00', 0x0, 0x0) 06:52:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={r7, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) [ 1353.776591][ T6912] BPF:, 0 (anon) [ 1353.791190][ T6912] BPF:, 3 (invalid-name-offset) 06:52:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x9000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:31 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000ec0)={0xffffffffffffffff, 0x0, 0x0}, 0x1c) [ 1353.819760][ T6912] BPF:) [ 1353.828920][ T6912] BPF: [ 1353.840101][ T6912] BPF:Invalid arg#1 06:52:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @remote}, @L2TP_ATTR_PW_TYPE={0x6}]}, 0x30}}, 0x0) [ 1353.865037][ T6912] BPF: [ 1353.865037][ T6912] 06:52:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 06:52:31 executing program 0: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}, {[], {}, {{0x9, 0x5, 0x3, 0x2, 0x20}}}}}]}}]}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) [ 1353.920809][ T6932] BPF:[1] FUNC_PROTO (anon) [ 1353.936862][ T6932] BPF:return=0 args=( [ 1353.941303][ T6935] BPF:[1] FUNC_PROTO (anon) [ 1353.951027][ T6932] BPF:0 (invalid-name-offset) [ 1353.958292][ T6935] BPF:return=0 args=( [ 1353.975658][ T6932] BPF:, 0 (anon) [ 1353.980516][ T6935] BPF:0 (invalid-name-offset) [ 1353.989100][ T6932] BPF:, 3 (invalid-name-offset) [ 1353.994481][ T6935] BPF:, vararg [ 1354.003406][ T6935] BPF:) [ 1354.007428][ T6932] BPF:) [ 1354.013915][ T6935] BPF: [ 1354.019097][ T6932] BPF: 06:52:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xa00}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:31 executing program 1: openat$rdma_cm(0xffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000007c0), 0x10) syz_open_dev$ptys(0xc, 0x3, 0x0) openat$autofs(0xffffff9c, &(0x7f0000000e80)='/dev/autofs\x00', 0x200d40, 0x0) 06:52:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={r7, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) 06:52:31 executing program 3: openat$rdma_cm(0xffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) [ 1354.026079][ T6935] BPF:Invalid arg#1 [ 1354.037719][ T6932] BPF:Invalid arg#1 [ 1354.042625][ T6932] BPF: [ 1354.042625][ T6932] [ 1354.048577][ T6935] BPF: [ 1354.048577][ T6935] [ 1354.060968][ T6947] BPF:[1] FUNC_PROTO (anon) [ 1354.071599][ T6947] BPF:return=0 args=( [ 1354.091932][ T6947] BPF:0 (invalid-name-offset) [ 1354.104970][ T6947] BPF:, vararg [ 1354.120033][ T6947] BPF:) [ 1354.130931][ T6947] BPF: 06:52:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={0x0}}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000009c0)='l2tp\x00', 0xffffffffffffffff) 06:52:32 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) openat$ttyprintk(0xffffff9c, &(0x7f0000000300)='/dev/ttyprintk\x00', 0x0, 0x0) [ 1354.143888][ T6947] BPF:Invalid arg#1 [ 1354.161094][ T6947] BPF: [ 1354.161094][ T6947] [ 1354.172283][ T6962] BPF:[1] FUNC_PROTO (anon) [ 1354.184954][ T6962] BPF:return=0 args=( [ 1354.227144][ T6962] BPF:0 (invalid-name-offset) 06:52:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xa000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1354.250931][ T6962] BPF:, 0 (anon) [ 1354.255596][ T6962] BPF:, 3 (invalid-name-offset) [ 1354.272280][ T6962] BPF:) [ 1354.279037][ T6962] BPF: [ 1354.284166][ T6962] BPF:Invalid arg#1 06:52:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={r7, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) [ 1354.303198][ T6962] BPF: [ 1354.303198][ T6962] [ 1354.319442][ T9706] usb 1-1: new high-speed USB device number 107 using dummy_hcd 06:52:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000001380)=ANY=[@ANYBLOB="e07500002c0001002abd7000fddbdf2500000000", @ANYBLOB="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", @ANYBLOB="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"], 0x75e0}}, 0x0) 06:52:32 executing program 1: r0 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000580)='/sys/kernel/mm/transparent_hugepage/khugepaged/scan_sleep_millisecs\x00', 0x1, 0x0) write$khugepaged_scan(r0, &(0x7f0000000600)='1000000\x00', 0x8) [ 1354.343513][ T6975] BPF:[1] FUNC_PROTO (anon) [ 1354.349799][ T6976] BPF:[1] FUNC_PROTO (anon) [ 1354.360241][ T6976] BPF:return=0 args=( [ 1354.369459][ T6976] BPF:0 (invalid-name-offset) [ 1354.377666][ T6976] BPF:, vararg [ 1354.383667][ T6975] BPF:return=0 args=( [ 1354.384859][ T6976] BPF:) [ 1354.394901][ T6976] BPF: [ 1354.400842][ T6975] BPF:0 (invalid-name-offset) [ 1354.402034][ T6976] BPF:Invalid arg#1 [ 1354.414633][ T6983] netlink: 24892 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1354.422767][ T6975] BPF:, 0 (anon) [ 1354.424743][ T6976] BPF: [ 1354.424743][ T6976] 06:52:32 executing program 3: socketpair(0xa, 0x5, 0x0, &(0x7f00000004c0)) [ 1354.443256][ T6986] BPF:[1] FUNC_PROTO (anon) [ 1354.447145][ T6975] BPF:, 3 (invalid-name-offset) [ 1354.455562][ T6986] BPF:return=0 args=( [ 1354.463696][ T6986] BPF:0 (invalid-name-offset) [ 1354.470367][ T6986] BPF:, vararg [ 1354.474055][ T6986] BPF:) [ 1354.477920][ T6986] BPF: [ 1354.481624][ T6986] BPF:Invalid arg#1 [ 1354.496144][ T6975] BPF:) [ 1354.503773][ T6975] BPF: [ 1354.507210][ T6986] BPF: [ 1354.507210][ T6986] [ 1354.513062][ T6975] BPF:Invalid arg#1 [ 1354.520235][ T6975] BPF: [ 1354.520235][ T6975] [ 1354.686606][ T9706] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1354.856789][ T9706] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1354.875349][ T9706] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1354.888593][ T9706] usb 1-1: Product: syz [ 1354.893167][ T9706] usb 1-1: Manufacturer: syz [ 1354.898467][ T9706] usb 1-1: SerialNumber: syz [ 1354.917212][ T6945] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1354.937283][ T9706] cdc_ether: probe of 1-1:1.0 failed with error -22 [ 1355.026865][ T3237] ieee802154 phy0 wpan0: encryption failed: -22 [ 1355.033220][ T3237] ieee802154 phy1 wpan1: encryption failed: -22 [ 1355.140253][ T9705] usb 1-1: USB disconnect, device number 107 [ 1355.911427][ T4833] ================================================================== [ 1355.919676][ T4833] BUG: KCSAN: data-race in drop_nlink / generic_fillattr [ 1355.926780][ T4833] [ 1355.929104][ T4833] write to 0xffff88803e379698 of 4 bytes by task 5795 on cpu 1: [ 1355.936739][ T4833] drop_nlink+0x37/0x90 [ 1355.940899][ T4833] shmem_unlink+0x17b/0x1a0 [ 1355.945395][ T4833] shmem_rename2+0x2fd/0x440 [ 1355.949981][ T4833] vfs_rename+0x811/0xde0 [ 1355.954313][ T4833] do_renameat2+0x658/0x990 [ 1355.958821][ T4833] __x64_sys_rename+0x58/0x60 [ 1355.963488][ T4833] do_syscall_64+0x39/0x80 [ 1355.967908][ T4833] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1355.973786][ T4833] [ 1355.976092][ T4833] read to 0xffff88803e379698 of 4 bytes by task 4833 on cpu 0: [ 1355.983673][ T4833] generic_fillattr+0x76/0x190 [ 1355.988464][ T4833] shmem_getattr+0x239/0x2d0 [ 1355.993050][ T4833] vfs_getattr_nosec+0x18f/0x340 [ 1355.997994][ T4833] __se_sys_newfstat+0x94/0x2c0 [ 1356.002847][ T4833] __x64_sys_newfstat+0x2d/0x40 [ 1356.007676][ T4833] do_syscall_64+0x39/0x80 [ 1356.012160][ T4833] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1356.018137][ T4833] [ 1356.020542][ T4833] Reported by Kernel Concurrency Sanitizer on: [ 1356.026668][ T4833] CPU: 0 PID: 4833 Comm: systemd-udevd Not tainted 5.12.0-rc4-syzkaller #0 [ 1356.035299][ T4833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1356.045616][ T4833] ================================================================== [ 1356.054724][T16747] usb 1-1: new high-speed USB device number 108 using dummy_hcd [ 1356.426664][T16747] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1356.617892][T16747] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1356.627238][T16747] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1356.635336][T16747] usb 1-1: Product: syz [ 1356.640643][T16747] usb 1-1: Manufacturer: syz [ 1356.645389][T16747] usb 1-1: SerialNumber: syz [ 1356.667482][ T6945] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1356.687125][T16747] cdc_ether: probe of 1-1:1.0 failed with error -22 06:52:34 executing program 0: syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) 06:52:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={r7, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) 06:52:34 executing program 1: r0 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 06:52:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xb000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xb00}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:34 executing program 3: openat$ttynull(0xffffff9c, &(0x7f00000001c0)='/dev/ttynull\x00', 0x0, 0x0) [ 1356.890813][T16747] usb 1-1: USB disconnect, device number 108 06:52:34 executing program 0: r0 = openat$autofs(0xffffff9c, &(0x7f0000000580)='/dev/autofs\x00', 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, 0x0, 0x0) [ 1357.002655][ T7035] BPF:[1] FUNC_PROTO (anon) 06:52:34 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x64, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, 0x9c) 06:52:34 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0x0) 06:52:34 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x82, 0x0, 0x0) [ 1357.024990][ T7036] BPF:[1] FUNC_PROTO (anon) [ 1357.034399][ T7035] BPF:return=0 args=( [ 1357.052406][ T7036] BPF:return=0 args=( [ 1357.056202][ T7035] BPF:0 (invalid-name-offset) [ 1357.070591][ T7035] BPF:, vararg 06:52:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={r7, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) [ 1357.074508][ T7036] BPF:0 (invalid-name-offset) [ 1357.082659][ T7035] BPF:) [ 1357.089979][ T7035] BPF: [ 1357.105518][ T7035] BPF:Invalid arg#1 [ 1357.106053][ T7036] BPF:, 0 (anon) 06:52:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=@ipv4_newnexthop={0x10, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_FDB={0x4}]}, 0x1c}}, 0x0) [ 1357.126252][ T7035] BPF: [ 1357.126252][ T7035] [ 1357.129977][ T7036] BPF:, 3 (invalid-name-offset) [ 1357.151778][ T7036] BPF:) [ 1357.164523][ T7036] BPF: [ 1357.168018][ T7047] BPF:[1] FUNC_PROTO (anon) 06:52:35 executing program 0: r0 = fsopen(&(0x7f0000000000)='erofs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_tnsaction_log\x00', &(0x7f00000000c0), 0x0) [ 1357.175241][ T7036] BPF:Invalid arg#1 [ 1357.184619][ T7047] BPF:return=0 args=( [ 1357.194445][ T7036] BPF: [ 1357.194445][ T7036] [ 1357.206110][ T7047] BPF:0 (invalid-name-offset) 06:52:35 executing program 3: add_key$fscrypt_provisioning(&(0x7f00000000c0)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) [ 1357.227387][ T7047] BPF:, vararg [ 1357.235002][ T7036] BPF:[1] FUNC_PROTO (anon) [ 1357.235899][ T7047] BPF:) [ 1357.253432][ T7047] BPF: [ 1357.260154][ T7036] BPF:return=0 args=( [ 1357.267495][ T7047] BPF:Invalid arg#1 [ 1357.270513][ T7036] BPF:0 (invalid-name-offset) 06:52:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xc000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:35 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000200)='ns/time_for_children\x00') ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) [ 1357.271460][ T7047] BPF: [ 1357.271460][ T7047] [ 1357.341484][ T7036] BPF:, 0 (anon) [ 1357.364057][ T7036] BPF:, 3 (invalid-name-offset) [ 1357.365345][ T7066] BPF:[1] FUNC_PROTO (anon) [ 1357.378117][ T7066] BPF:return=0 args=( [ 1357.382632][ T7066] BPF:0 (invalid-name-offset) [ 1357.389704][ T7036] BPF:) [ 1357.390922][ T7066] BPF:, vararg [ 1357.407138][ T7066] BPF:) [ 1357.411939][ T7036] BPF: [ 1357.413587][ T7066] BPF: [ 1357.419808][ T7066] BPF:Invalid arg#1 [ 1357.423890][ T7066] BPF: [ 1357.423890][ T7066] [ 1357.426874][ T7036] BPF:Invalid arg#1 [ 1357.440728][ T7036] BPF: [ 1357.440728][ T7036] [ 1357.445919][ T7070] BPF:[1] FUNC_PROTO (anon) [ 1357.452809][ T7070] BPF:return=0 args=( 06:52:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xc00}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={r7, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) 06:52:35 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_io_uring_setup(0x4c4a, &(0x7f0000000140)={0x0, 0x8038, 0x2, 0x3, 0x370}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000001c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000006, 0x12, r0, 0x0) 06:52:35 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f00000000c0)) 06:52:35 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000f, 0x13, r0, 0x8000000) [ 1357.468440][ T7070] BPF:0 (invalid-name-offset) [ 1357.473156][ T7070] BPF:, vararg [ 1357.476522][ T7070] BPF:) [ 1357.506799][ T7070] BPF: [ 1357.524519][ T7070] BPF:Invalid arg#1 [ 1357.549078][ T7070] BPF: [ 1357.549078][ T7070] [ 1357.584874][ T7089] BPF:[1] FUNC_PROTO (anon) [ 1357.600331][ T7089] BPF:return=0 args=( [ 1357.612179][ T7089] BPF:0 (invalid-name-offset) [ 1357.630087][ T7089] BPF:, 0 (anon) 06:52:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x78) 06:52:35 executing program 1: getrusage(0x0, &(0x7f0000000280)) 06:52:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xd000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1357.645284][ T7089] BPF:, 3 (invalid-name-offset) 06:52:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000100)={r6, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32], 0x20}}, 0x0) 06:52:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c000000680001000000000000000002000000000000000004"], 0x1c}}, 0x0) [ 1357.682056][ T7089] BPF:) [ 1357.700480][ T7089] BPF: [ 1357.712537][ T7089] BPF:Invalid arg#1 [ 1357.729566][ T7089] BPF: [ 1357.729566][ T7089] 06:52:35 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) write$vga_arbiter(r0, 0x0, 0x0) 06:52:35 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1e, 0x0, 0x0) [ 1357.755396][ T7105] BPF:[1] FUNC_PROTO (anon) [ 1357.767974][ T7106] BPF:[1] FUNC_PROTO (anon) [ 1357.783999][ T7107] device batadv_slave_1 entered promiscuous mode [ 1357.803677][ T7101] device batadv_slave_1 left promiscuous mode [ 1357.808104][ T7105] BPF:return=0 args=( [ 1357.822857][ T7105] BPF:0 (invalid-name-offset) [ 1357.829178][ T7106] BPF:return=0 args=( [ 1357.846855][ T7106] BPF:0 (invalid-name-offset) [ 1357.855220][ T7105] BPF:, vararg [ 1357.860881][ T7106] BPF:, 0 (anon) [ 1357.870694][ T7106] BPF:, 3 (invalid-name-offset) [ 1357.871123][ T7105] BPF:) [ 1357.883507][ T7106] BPF:) [ 1357.895771][ T7105] BPF: [ 1357.896108][ T7106] BPF: 06:52:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xd00}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000100)={r6, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32], 0x20}}, 0x0) 06:52:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x14}, 0x0) 06:52:35 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000380)={r0}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8983, &(0x7f00000003c0)={0x7, 'ipvlan1\x00', {0x3f}, 0x6}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x810}, &(0x7f0000000040)=0x8) r2 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000080)={0x0, 'batadv0\x00', {0x3}, 0x19}) sendmsg$sock(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000100)="04d60b3a82a79584d0fc282c9b96e67d950fa641037b708afb5344558e78ced1ba2426baeb61a6a6a96f75f894181313f493600d99e2f7bbf954b7bec950871d2017585e3397d5f95a48a46fed169b008647461f4e58ab0a8e95908d4d922ba519980c90d5c82b80043d674c769cb4f7be046ebd44fa2d08eef3ae08b79cef74eda82512fd8e30ae9177f8bb32cffc75c11b95fafeead3180ab7cab631d5fe6e7c1887594dfb71fa1404e288d2ad02386785cb43ada1c27cdb8c702e41c0b8954d80b0d4c0e5286cbdd3992a5cd26d7d11d2d7471bd3f8b36ebb924c32", 0xdd}, {&(0x7f0000000200)="2cd377ef47acaab0471bf2c154fb474b49e9ab508739fa95b4dea951f56891c51cc4def27e13f4d4704c158df3cebd14298e5e3348c89688f0d317754f0079acb451685535d10ff4e825102ba3816008c4f8f5e2cce0d956aeca32e35bbc0e0eb13b23a77574f3ef70aa0dbc6f2113aacd17375039b641dd3eae1257d345a41bec354f2b500bfa68961d6f4276510603c8006759edce9f1fbac7acf2af9194fa5a7697c43e759e2a1944e7e89c42056f540970d50fb5b897bc6060", 0xbb}, {&(0x7f00000002c0)="c6f922d4e64119", 0x7}], 0x3}, 0x4840) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x3, 0x0, 0x700) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00', {0x4}, 0x6}) 06:52:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=@ipv4_newnexthop={0x1c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_FDB={0x4, 0xc}]}, 0x1c}}, 0x0) [ 1357.905140][ T7105] BPF:Invalid arg#1 [ 1357.906284][ T7106] BPF:Invalid arg#1 [ 1357.917600][ T7106] BPF: [ 1357.917600][ T7106] [ 1357.931360][ T7105] BPF: [ 1357.931360][ T7105] [ 1357.962581][ T7118] BPF:[1] FUNC_PROTO (anon) [ 1357.976595][ T7118] BPF:return=0 args=( [ 1357.995712][ T7118] BPF:0 (invalid-name-offset) [ 1358.012106][ T7118] BPF:, vararg 06:52:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@bridge_delvlan={0x18, 0x71, 0x1}, 0x18}}, 0x0) [ 1358.033604][ T7118] BPF:) [ 1358.046620][ T7129] BPF:[1] FUNC_PROTO (anon) [ 1358.050310][ T7127] device batadv_slave_1 entered promiscuous mode [ 1358.053976][ T7118] BPF: [ 1358.071352][ T7118] BPF:Invalid arg#1 [ 1358.076417][ T7129] BPF:return=0 args=( 06:52:35 executing program 3: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x8}, 0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) [ 1358.092086][ T7119] device batadv_slave_1 left promiscuous mode [ 1358.099325][ T7118] BPF: [ 1358.099325][ T7118] [ 1358.108365][ T7129] BPF:0 (invalid-name-offset) [ 1358.124941][ T7129] BPF:, 0 (anon) 06:52:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xe000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:35 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0xf4240, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:52:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000100)={r6, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32], 0x20}}, 0x0) [ 1358.138054][ T7129] BPF:, 3 (invalid-name-offset) [ 1358.155541][ T7129] BPF:) [ 1358.170747][ T7129] BPF: [ 1358.179291][ T7129] BPF:Invalid arg#1 06:52:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@bridge_delvlan={0x18, 0x71, 0x1}, 0x18}}, 0x0) [ 1358.203842][ T7129] BPF: [ 1358.203842][ T7129] [ 1358.233923][ T7143] BPF:[1] FUNC_PROTO (anon) [ 1358.235712][ T7142] BPF:[1] FUNC_PROTO (anon) [ 1358.252452][ T7143] BPF:return=0 args=( [ 1358.266114][ T7142] BPF:return=0 args=( [ 1358.272112][ T7143] BPF:0 (invalid-name-offset) 06:52:36 executing program 3: syz_io_uring_setup(0x6940, &(0x7f0000000100)={0x0, 0x0, 0x8}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) [ 1358.282780][ T7145] device batadv_slave_1 entered promiscuous mode [ 1358.289049][ T7142] BPF:0 (invalid-name-offset) [ 1358.297449][ T7143] BPF:, 0 (anon) [ 1358.314398][ T7138] device batadv_slave_1 left promiscuous mode [ 1358.321162][T14319] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1358.322471][ T7143] BPF:, 3 (invalid-name-offset) [ 1358.331967][ T3010] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1358.349396][ T7142] BPF:, vararg [ 1358.365988][ T7143] BPF:) [ 1358.369205][ T7142] BPF:) [ 1358.378624][ T7142] BPF: [ 1358.385384][ T7142] BPF:Invalid arg#1 [ 1358.388829][ T7143] BPF: [ 1358.398850][ T7142] BPF: [ 1358.398850][ T7142] [ 1358.401842][ T7143] BPF:Invalid arg#1 [ 1358.424173][ T7143] BPF: [ 1358.424173][ T7143] [ 1358.424312][ T7153] BPF:[1] FUNC_PROTO (anon) 06:52:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xe00}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@bridge_delvlan={0x18, 0x71, 0x1}, 0x18}}, 0x0) 06:52:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000100)={r7, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r4], 0x20}}, 0x0) 06:52:36 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) preadv(r0, &(0x7f0000002480)=[{&(0x7f0000000040)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x6, 0x0) [ 1358.451960][ T7153] BPF:return=0 args=( [ 1358.462331][ T7153] BPF:0 (invalid-name-offset) [ 1358.492426][ T7153] BPF:, vararg [ 1358.508125][ T7153] BPF:) [ 1358.523107][ T7153] BPF: [ 1358.538804][ T7153] BPF:Invalid arg#1 [ 1358.540723][ T7158] device batadv_slave_1 entered promiscuous mode [ 1358.567316][ T7153] BPF: [ 1358.567316][ T7153] [ 1358.581907][ T7154] device batadv_slave_1 left promiscuous mode [ 1358.587422][ T7164] BPF:[1] FUNC_PROTO (anon) 06:52:36 executing program 3: pselect6(0x40, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) 06:52:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@bridge_delvlan={0x18, 0x71, 0x1}, 0x18}}, 0x0) 06:52:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xf000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000100)={r7, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r4], 0x20}}, 0x0) [ 1358.616944][ T7164] BPF:return=0 args=( [ 1358.635157][ T7164] BPF:0 (invalid-name-offset) [ 1358.651223][ T7164] BPF:, 0 (anon) [ 1358.660889][ T7164] BPF:, 3 (invalid-name-offset) [ 1358.679747][ T7164] BPF:) [ 1358.692415][ T7164] BPF: [ 1358.703795][ T7164] BPF:Invalid arg#1 [ 1358.725303][ T7164] BPF: [ 1358.725303][ T7164] [ 1358.761489][ T7173] BPF:[1] FUNC_PROTO (anon) [ 1358.767948][ T7172] device batadv_slave_1 entered promiscuous mode [ 1358.775194][ T7176] BPF:[1] FUNC_PROTO (anon) [ 1358.782173][ T7173] BPF:return=0 args=( [ 1358.784446][ T7169] device batadv_slave_1 left promiscuous mode [ 1358.789846][ T7176] BPF:return=0 args=( [ 1358.798845][ T7173] BPF:0 (invalid-name-offset) [ 1358.805049][ T7176] BPF:0 (invalid-name-offset) [ 1358.815294][ T7173] BPF:, vararg [ 1358.820035][ T7176] BPF:, 0 (anon) [ 1358.827212][ T7173] BPF:) [ 1358.831469][ T7176] BPF:, 3 (invalid-name-offset) [ 1358.840565][ T7173] BPF: [ 1358.852422][ T7176] BPF:) [ 1358.855294][ T7173] BPF:Invalid arg#1 [ 1358.862670][ T7176] BPF: [ 1358.866769][ T7173] BPF: [ 1358.866769][ T7173] [ 1358.873950][ T7176] BPF:Invalid arg#1 [ 1358.892378][ T7176] BPF: [ 1358.892378][ T7176] [ 1358.903292][ T7178] BPF:[1] FUNC_PROTO (anon) [ 1358.915772][ T7178] BPF:return=0 args=( [ 1358.927890][ T7178] BPF:0 (invalid-name-offset) [ 1358.947524][ T7178] BPF:, vararg [ 1358.957285][ T7178] BPF:) [ 1358.974673][ T7178] BPF: [ 1358.984553][ T7178] BPF:Invalid arg#1 [ 1358.993946][ T7178] BPF: [ 1358.993946][ T7178] 06:52:37 executing program 0: syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x406c0) 06:52:37 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@bridge_delvlan={0x18, 0x71, 0x1}, 0x18}}, 0x0) 06:52:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000100)={r7, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r4], 0x20}}, 0x0) 06:52:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x1100}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x10000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1359.360594][ T7191] BPF:[1] FUNC_PROTO (anon) [ 1359.373922][ T7191] BPF:return=0 args=( [ 1359.386484][ T7191] BPF:0 (invalid-name-offset) [ 1359.394672][ T7193] device batadv_slave_1 entered promiscuous mode [ 1359.403602][ T7194] BPF:[1] FUNC_PROTO (anon) 06:52:37 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@bridge_delvlan={0x18, 0x71, 0x1}, 0x18}}, 0x0) [ 1359.408387][ T7191] BPF:, 0 (anon) [ 1359.415925][ T7194] BPF:return=0 args=( [ 1359.421488][ T7191] BPF:, 3 (invalid-name-offset) [ 1359.422472][ T7189] device batadv_slave_1 left promiscuous mode [ 1359.449677][ T7194] BPF:0 (invalid-name-offset) [ 1359.456293][ T7191] BPF:) 06:52:37 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1c, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:52:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000100)={r7, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r4], 0x20}}, 0x0) [ 1359.465369][ T7191] BPF: [ 1359.470652][ T7194] BPF:, vararg [ 1359.475080][ T7191] BPF:Invalid arg#1 [ 1359.494941][ T7194] BPF:) [ 1359.500523][ T7191] BPF: [ 1359.500523][ T7191] [ 1359.512468][ T7194] BPF: [ 1359.522091][ T7194] BPF:Invalid arg#1 [ 1359.526822][ T7206] BPF:[1] FUNC_PROTO (anon) [ 1359.532674][ T7194] BPF: [ 1359.532674][ T7194] [ 1359.538627][ T7206] BPF:return=0 args=( [ 1359.543399][ T7206] BPF:0 (invalid-name-offset) [ 1359.554481][ T7206] BPF:, 0 (anon) [ 1359.559269][ T7206] BPF:, 3 (invalid-name-offset) [ 1359.563017][ T7207] BPF:[1] FUNC_PROTO (anon) [ 1359.564928][ T7206] BPF:) 06:52:37 executing program 3: r0 = fsopen(&(0x7f0000001840)='befs\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, 0x0, 0x0, 0x0) 06:52:37 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@bridge_delvlan={0x18, 0x71, 0x1}, 0x18}}, 0x0) 06:52:37 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xb, 0x0, 0x0) [ 1359.584457][ T7206] BPF: [ 1359.586402][ T7207] BPF:return=0 args=( [ 1359.592385][ T7206] BPF:Invalid arg#1 [ 1359.603528][ T7207] BPF:0 (invalid-name-offset) [ 1359.605449][ T7206] BPF: [ 1359.605449][ T7206] [ 1359.622684][ T7207] BPF:, vararg [ 1359.634192][ T7207] BPF:) [ 1359.639211][ T7209] device batadv_slave_1 entered promiscuous mode [ 1359.644890][ T7207] BPF: [ 1359.658943][ T7207] BPF:Invalid arg#1 [ 1359.663458][ T7205] device batadv_slave_1 left promiscuous mode 06:52:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x1200}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) [ 1359.691455][ T7207] BPF: [ 1359.691455][ T7207] 06:52:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000100)={r7, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r4], 0x20}}, 0x0) 06:52:37 executing program 1: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@bridge_delvlan={0x18, 0x71, 0x1}, 0x18}}, 0x0) 06:52:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x11000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:37 executing program 3: r0 = fsopen(&(0x7f0000000000)='erofs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_tnsaction_log\x00', &(0x7f00000000c0)='q', 0x1) 06:52:37 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x12, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1359.814356][ T7223] BPF:[1] FUNC_PROTO (anon) [ 1359.831447][ T7223] BPF:return=0 args=( [ 1359.850238][ T7223] BPF:0 (invalid-name-offset) [ 1359.858054][ T7229] BPF:[1] FUNC_PROTO (anon) [ 1359.858066][ T7229] BPF:return=0 args=( [ 1359.858074][ T7229] BPF:0 (invalid-name-offset) [ 1359.858080][ T7229] BPF:, vararg [ 1359.858086][ T7229] BPF:) [ 1359.858090][ T7229] BPF: [ 1359.858096][ T7229] BPF:Invalid arg#1 [ 1359.858101][ T7229] BPF: [ 1359.858101][ T7229] [ 1359.869645][ T7232] BPF:[1] FUNC_PROTO (anon) [ 1359.869657][ T7232] BPF:return=0 args=( [ 1359.869666][ T7232] BPF:0 (invalid-name-offset) 06:52:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x12000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:37 executing program 1: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@bridge_delvlan={0x18, 0x71, 0x1}, 0x18}}, 0x0) 06:52:37 executing program 3: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x8}, &(0x7f0000000300), &(0x7f0000000340)={0x77359400}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xfffffffffffffff8]}, 0x8}) 06:52:37 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6c0e1cba"}, 0x0, 0x0, @planes=0x0}) [ 1359.869673][ T7232] BPF:, vararg [ 1359.869679][ T7232] BPF:) [ 1359.869683][ T7232] BPF: [ 1359.869689][ T7232] BPF:Invalid arg#1 [ 1359.869761][ T7232] BPF: [ 1359.869761][ T7232] [ 1359.875966][ T7223] BPF:, 0 (anon) [ 1359.904753][ T7231] device batadv_slave_1 entered promiscuous mode 06:52:37 executing program 3: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x7ef, 0x20040) [ 1360.019506][ T7242] BPF:[1] FUNC_PROTO (anon) [ 1360.030434][ T7223] BPF:, 3 (invalid-name-offset) [ 1360.040987][ T7226] device batadv_slave_1 left promiscuous mode [ 1360.051458][ T7242] BPF:return=0 args=( 06:52:37 executing program 1: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@bridge_delvlan={0x18, 0x71, 0x1}, 0x18}}, 0x0) [ 1360.071889][ T7223] BPF:) [ 1360.075779][ T7242] BPF:0 (invalid-name-offset) [ 1360.093526][ T7223] BPF: [ 1360.104928][ T7242] BPF:, vararg [ 1360.109844][ T7223] BPF:Invalid arg#1 [ 1360.129465][ T7242] BPF:) [ 1360.133654][ T7223] BPF: [ 1360.133654][ T7223] [ 1360.141442][ T7242] BPF: [ 1360.144430][ T7242] BPF:Invalid arg#1 [ 1360.150707][ T7242] BPF: [ 1360.150707][ T7242] [ 1360.165459][ T7251] BPF:[1] FUNC_PROTO (anon) [ 1360.179345][ T7251] BPF:return=0 args=( [ 1360.179621][ T7254] BPF:[1] FUNC_PROTO (anon) [ 1360.188003][ T7251] BPF:0 (invalid-name-offset) [ 1360.188131][ T7251] BPF:, 0 (anon) [ 1360.195046][ T7254] BPF:return=0 args=( [ 1360.207168][ T7254] BPF:0 (invalid-name-offset) [ 1360.212157][ T7254] BPF:, vararg [ 1360.215691][ T7254] BPF:) [ 1360.218771][ T7254] BPF: [ 1360.219497][ T7251] BPF:, 3 (invalid-name-offset) [ 1360.221652][ T7254] BPF:Invalid arg#1 06:52:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x2000}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000100)={r7, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r4], 0x20}}, 0x0) 06:52:38 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000000d00)=[{{&(0x7f0000000680)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000c80)=[@flowinfo={{0x14, 0x29, 0xb, 0x2f4}}], 0x18}}], 0x1, 0x0) 06:52:38 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x13, 0x0, 0x0) 06:52:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 06:52:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1e000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1360.233479][ T7251] BPF:) [ 1360.234152][ T7254] BPF: [ 1360.234152][ T7254] [ 1360.240466][ T7251] BPF: [ 1360.245069][ T7251] BPF:Invalid arg#1 [ 1360.255082][ T7251] BPF: [ 1360.255082][ T7251] [ 1360.360434][ T7262] device batadv_slave_1 entered promiscuous mode [ 1360.378987][ T7270] BPF:[1] FUNC_PROTO (anon) [ 1360.386342][ T7257] device batadv_slave_1 left promiscuous mode [ 1360.392671][ T7270] BPF:return=0 args=( 06:52:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=@ipv4_newnexthop={0x30, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_GATEWAY={0x14, 0x6, @in6_addr=@private0}, @NHA_FDB={0x4}]}, 0x30}}, 0x0) 06:52:38 executing program 3: r0 = fsopen(&(0x7f0000000000)='erofs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, 0x0, 0x0, 0x0) 06:52:38 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r4 = socket$packet(0x11, 0x2, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000100)={r6, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r3], 0x20}}, 0x0) 06:52:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 1360.408731][ T7271] BPF:[1] FUNC_PROTO (anon) [ 1360.419587][ T7270] BPF:0 (invalid-name-offset) [ 1360.440129][ T7271] BPF:return=0 args=( [ 1360.454535][ T7271] BPF:0 (invalid-name-offset) [ 1360.462359][ T7270] BPF:, vararg [ 1360.471994][ T7270] BPF:) [ 1360.480907][ T7271] BPF:, 0 (anon) [ 1360.480947][ T7270] BPF: [ 1360.495852][ T7271] BPF:, 3 (invalid-name-offset) [ 1360.506166][ T7270] BPF:Invalid arg#1 06:52:38 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) r1 = fsopen(&(0x7f0000001840)='befs\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000040)='\x00', 0x0, r0) 06:52:38 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x4c4a, &(0x7f0000000140), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000001c0)) [ 1360.519853][ T7270] BPF: [ 1360.519853][ T7270] [ 1360.529142][ T7271] BPF:) [ 1360.531029][ T7281] device batadv_slave_1 entered promiscuous mode [ 1360.543056][ T7271] BPF: [ 1360.550641][ T7283] BPF:[1] FUNC_PROTO (anon) [ 1360.565699][ T7271] BPF:Invalid arg#1 [ 1360.570231][ T7283] BPF:return=0 args=( [ 1360.570244][ T7283] BPF:0 (invalid-name-offset) [ 1360.570251][ T7283] BPF:, vararg [ 1360.570257][ T7283] BPF:) [ 1360.570263][ T7283] BPF: [ 1360.570356][ T7283] BPF:Invalid arg#1 [ 1360.592342][ T7276] device batadv_slave_1 left promiscuous mode [ 1360.593905][ T7271] BPF: [ 1360.593905][ T7271] [ 1360.636241][ T7283] BPF: [ 1360.636241][ T7283] [ 1360.641864][ T7287] BPF:[1] FUNC_PROTO (anon) [ 1360.650778][ T7287] BPF:return=0 args=( [ 1360.661579][ T7287] BPF:0 (invalid-name-offset) 06:52:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x2500}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:38 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r4 = socket$packet(0x11, 0x2, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000100)={r6, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r3], 0x20}}, 0x0) 06:52:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 06:52:38 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x100006, 0xfc, 0x0, {r0}}, 0x20) 06:52:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x20000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:38 executing program 0: r0 = fsopen(&(0x7f0000001840)='befs\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000000)='(\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) [ 1360.683257][ T7287] BPF:, 0 (anon) [ 1360.694860][ T7287] BPF:, 3 (invalid-name-offset) [ 1360.701608][ T7287] BPF:) [ 1360.715677][ T7287] BPF: [ 1360.719559][ T7287] BPF:Invalid arg#1 [ 1360.723447][ T7287] BPF: [ 1360.723447][ T7287] [ 1360.805972][ T7304] device batadv_slave_1 entered promiscuous mode [ 1360.815657][ T7303] BPF:[1] FUNC_PROTO (anon) [ 1360.823510][ T7303] BPF:return=0 args=( [ 1360.831118][ T7305] BPF:[1] FUNC_PROTO (anon) [ 1360.836266][ T7298] device batadv_slave_1 left promiscuous mode [ 1360.843461][ T7303] BPF:0 (invalid-name-offset) 06:52:38 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r4 = socket$packet(0x11, 0x2, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000100)={r6, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r3], 0x20}}, 0x0) [ 1360.857671][ T7305] BPF:return=0 args=( [ 1360.864521][ T7303] BPF:, vararg [ 1360.871856][ T7305] BPF:0 (invalid-name-offset) [ 1360.879230][ T7303] BPF:) [ 1360.883918][ T7303] BPF: [ 1360.894651][ T7305] BPF:, 0 (anon) [ 1360.901755][ T7303] BPF:Invalid arg#1 06:52:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 06:52:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x12, 0x0, 0x0) 06:52:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1360.907475][ T7305] BPF:, 3 (invalid-name-offset) [ 1360.913077][ T7303] BPF: [ 1360.913077][ T7303] [ 1360.922394][ T7305] BPF:) [ 1360.940157][ T7305] BPF: [ 1360.946381][ T7305] BPF:Invalid arg#1 [ 1360.950786][ T7311] BPF:[1] FUNC_PROTO (anon) [ 1360.955618][ T7314] device batadv_slave_1 entered promiscuous mode [ 1360.962388][ T7305] BPF: [ 1360.962388][ T7305] [ 1360.968911][ T7309] device batadv_slave_1 left promiscuous mode [ 1360.981067][ T7311] BPF:return=0 args=( [ 1360.981340][ T7316] BPF:[1] FUNC_PROTO (anon) [ 1360.995401][ T7311] BPF:0 (invalid-name-offset) 06:52:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000100)={r7, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r4], 0x20}}, 0x0) 06:52:38 executing program 0: socket$inet(0x2, 0x7a, 0x0) [ 1361.008594][ T7311] BPF:, vararg [ 1361.013599][ T7316] BPF:return=0 args=( [ 1361.021019][ T7311] BPF:) [ 1361.033731][ T7316] BPF:0 (invalid-name-offset) [ 1361.044670][ T7311] BPF: [ 1361.053590][ T7316] BPF:, 0 (anon) [ 1361.064659][ T7311] BPF:Invalid arg#1 [ 1361.077610][ T7316] BPF:, 3 (invalid-name-offset) [ 1361.083649][ T7311] BPF: [ 1361.083649][ T7311] [ 1361.094054][ T7316] BPF:) [ 1361.101285][ T7316] BPF: [ 1361.108345][ T7316] BPF:Invalid arg#1 06:52:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x2600}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 06:52:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) 06:52:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x25000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:38 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000300)={0x67446698, 0x0, 0x0, 0x0, 0x0, "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"}, 0x1001) [ 1361.118159][ T7322] device batadv_slave_1 entered promiscuous mode [ 1361.132480][ T7316] BPF: [ 1361.132480][ T7316] [ 1361.142102][ T7320] device batadv_slave_1 left promiscuous mode 06:52:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000100)={r7, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r4], 0x20}}, 0x0) [ 1361.249525][ T7336] BPF:[1] FUNC_PROTO (anon) [ 1361.265977][ T7339] BPF:[1] FUNC_PROTO (anon) [ 1361.275396][ T7336] BPF:return=0 args=( [ 1361.281970][ T7339] BPF:return=0 args=( [ 1361.288381][ T7336] BPF:0 (invalid-name-offset) 06:52:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 06:52:39 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x1, &(0x7f0000000080)=@raw=[@call], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) 06:52:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1361.301086][ T7339] BPF:0 (invalid-name-offset) [ 1361.306233][ T7341] device batadv_slave_1 entered promiscuous mode [ 1361.313503][ T7336] BPF:, vararg [ 1361.317658][ T7336] BPF:) [ 1361.320889][ T7339] BPF:, 0 (anon) [ 1361.325910][ T7332] device batadv_slave_1 left promiscuous mode [ 1361.333212][ T7336] BPF: [ 1361.339084][ T7339] BPF:, 3 (invalid-name-offset) [ 1361.347164][ T7336] BPF:Invalid arg#1 06:52:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000100)={r7, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r4], 0x20}}, 0x0) [ 1361.366590][ T7339] BPF:) [ 1361.371590][ T7336] BPF: [ 1361.371590][ T7336] [ 1361.383318][ T7339] BPF: [ 1361.393041][ T7339] BPF:Invalid arg#1 [ 1361.406418][ T7352] BPF:[1] FUNC_PROTO (anon) 06:52:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) [ 1361.415584][ T7339] BPF: [ 1361.415584][ T7339] 06:52:39 executing program 3: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000014c0)={0x14, r0, 0x203, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) [ 1361.441376][ T7352] BPF:return=0 args=( [ 1361.448870][ T7355] BPF:[1] FUNC_PROTO (anon) [ 1361.461855][ T7352] BPF:0 (invalid-name-offset) [ 1361.472573][ T7355] BPF:return=0 args=( [ 1361.484625][ T7356] device batadv_slave_1 entered promiscuous mode [ 1361.485989][ T7352] BPF:, vararg [ 1361.500678][ T7355] BPF:0 (invalid-name-offset) [ 1361.505718][ T7353] device batadv_slave_1 left promiscuous mode [ 1361.513926][ T7355] BPF:, 0 (anon) [ 1361.533868][ T7352] BPF:) [ 1361.541797][ T7355] BPF:, 3 (invalid-name-offset) [ 1361.559714][ T7352] BPF: [ 1361.567122][ T7355] BPF:) [ 1361.568408][ T7352] BPF:Invalid arg#1 [ 1361.574129][ T7352] BPF: [ 1361.574129][ T7352] [ 1361.580089][ T7355] BPF: [ 1361.588367][ T7355] BPF:Invalid arg#1 [ 1361.596628][ T7355] BPF: [ 1361.596628][ T7355] 06:52:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3f00}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:39 executing program 0: get_mempolicy(0x0, &(0x7f0000000040), 0x3f, &(0x7f0000002000/0x2000)=nil, 0x4) mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) 06:52:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x2, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={r8, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) 06:52:39 executing program 3: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000000)=0x2, 0x5, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) 06:52:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 06:52:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x43000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1361.710229][ T7375] BPF:[1] FUNC_PROTO (anon) [ 1361.715454][ T7375] BPF:return=0 args=( [ 1361.723675][ T7375] BPF:0 (invalid-name-offset) [ 1361.730647][ T7375] BPF:, 0 (anon) 06:52:39 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) mmap$snddsp_control(&(0x7f0000ffb000/0x4000)=nil, 0xfffffffffffff000, 0x0, 0x10, r0, 0x83000000) 06:52:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) [ 1361.752828][ T7377] device batadv_slave_1 entered promiscuous mode [ 1361.766444][ T7383] BPF:[1] FUNC_PROTO (anon) [ 1361.785044][ T7383] BPF:return=0 args=( [ 1361.791100][ T7375] BPF:, 3 (invalid-name-offset) [ 1361.791174][ T7368] device batadv_slave_1 left promiscuous mode 06:52:39 executing program 3: sendmsg$NL802154_CMD_SET_CCA_MODE(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$l2tp(&(0x7f0000001840)='l2tp\x00', 0xffffffffffffffff) [ 1361.815008][ T7375] BPF:) [ 1361.821932][ T7375] BPF: [ 1361.823225][ T7383] BPF:0 (invalid-name-offset) [ 1361.829875][ T7375] BPF:Invalid arg#1 [ 1361.850085][ T7375] BPF: [ 1361.850085][ T7375] [ 1361.856095][ T7383] BPF:, vararg 06:52:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x2, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={r8, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) 06:52:39 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x2) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x1000) [ 1361.868714][ T7388] BPF:[1] FUNC_PROTO (anon) [ 1361.880566][ T7383] BPF:) [ 1361.880914][ T7388] BPF:return=0 args=( [ 1361.890022][ T7388] BPF:0 (invalid-name-offset) [ 1361.904232][ T7383] BPF: [ 1361.909890][ T7388] BPF:, 0 (anon) [ 1361.915598][ T7388] BPF:, 3 (invalid-name-offset) [ 1361.922391][ T7383] BPF:Invalid arg#1 [ 1361.932299][ T7388] BPF:) [ 1361.941758][ T7383] BPF: [ 1361.941758][ T7383] [ 1361.948040][ T7388] BPF: [ 1361.954965][ T7388] BPF:Invalid arg#1 06:52:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@bridge_delvlan={0x18}, 0x18}}, 0x0) [ 1361.968283][ T7397] binder_alloc: binder_alloc_mmap_handler: 7390 20ff9000-20ffd000 already mapped failed -16 [ 1361.980992][ T7388] BPF: [ 1361.980992][ T7388] [ 1362.000837][ T7398] BPF:[1] FUNC_PROTO (anon) 06:52:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4300}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:39 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind(r0, &(0x7f0000000080)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev, 0x1000}}, 0x80) [ 1362.022394][ T7404] binder_alloc: binder_alloc_mmap_handler: 7390 20ff9000-20ffd000 already mapped failed -16 [ 1362.025458][ T7398] BPF:return=0 args=( [ 1362.039043][ T7400] device batadv_slave_1 entered promiscuous mode [ 1362.055092][ T7391] device batadv_slave_1 left promiscuous mode [ 1362.081377][ T7398] BPF:0 (invalid-name-offset) 06:52:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x2, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={r8, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) [ 1362.102912][ T7398] BPF:, vararg 06:52:39 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000100)={0x0, 0x1, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "dd4eb877"}, 0x0, 0x0, @planes=0x0}) 06:52:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@bridge_delvlan={0x18}, 0x18}}, 0x0) [ 1362.132384][ T7398] BPF:) [ 1362.137409][ T7411] BPF:[1] FUNC_PROTO (anon) [ 1362.142313][ T7398] BPF: [ 1362.147068][ T7411] BPF:return=0 args=( [ 1362.157653][ T7411] BPF:0 (invalid-name-offset) [ 1362.168273][ T7398] BPF:Invalid arg#1 [ 1362.174396][ T7411] BPF:, 0 (anon) [ 1362.174437][ T7398] BPF: [ 1362.174437][ T7398] 06:52:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x48000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:40 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x80601) write$evdev(r0, &(0x7f0000000100)=[{}], 0x18) [ 1362.196826][ T7411] BPF:, 3 (invalid-name-offset) [ 1362.210852][ T7411] BPF:) [ 1362.215634][ T7417] device batadv_slave_1 entered promiscuous mode [ 1362.221867][ T7411] BPF: [ 1362.229572][ T7411] BPF:Invalid arg#1 06:52:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@bridge_delvlan={0x18}, 0x18}}, 0x0) 06:52:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000200)={'batadv0\x00'}) [ 1362.246798][ T7413] device batadv_slave_1 left promiscuous mode [ 1362.264920][ T7411] BPF: [ 1362.264920][ T7411] 06:52:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x2, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={r8, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) [ 1362.298346][ T7425] BPF:[1] FUNC_PROTO (anon) 06:52:40 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3006, 0x1, 0x11, r0, 0x0) [ 1362.327206][ T7425] BPF:return=0 args=( [ 1362.338784][ T7425] BPF:0 (invalid-name-offset) [ 1362.350815][ T7431] BPF:[1] FUNC_PROTO (anon) [ 1362.361541][ T7425] BPF:, 0 (anon) 06:52:40 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) [ 1362.377345][ T7431] BPF:return=0 args=( [ 1362.387509][ T7425] BPF:, 3 (invalid-name-offset) [ 1362.396418][ T7431] BPF:0 (invalid-name-offset) [ 1362.407832][ T7425] BPF:) [ 1362.414278][ T7431] BPF:, vararg [ 1362.419642][ T7425] BPF: [ 1362.423489][ T7425] BPF:Invalid arg#1 [ 1362.428792][ T7431] BPF:) [ 1362.432222][ T7436] binder_alloc: binder_alloc_mmap_handler: 7434 20ffa000-20ffe000 already mapped failed -16 [ 1362.445294][ T7435] device batadv_slave_1 entered promiscuous mode [ 1362.446247][ T7431] BPF: [ 1362.457064][ T7425] BPF: [ 1362.457064][ T7425] [ 1362.466516][ T7429] device batadv_slave_1 left promiscuous mode [ 1362.476959][ T7431] BPF:Invalid arg#1 [ 1362.490882][ T7431] BPF: [ 1362.490882][ T7431] [ 1362.505292][ T7441] binder_alloc: binder_alloc_mmap_handler: 7434 20ffa000-20ffe000 already mapped failed -16 06:52:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4800}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:40 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/net\x00') 06:52:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x2, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={r8, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) 06:52:40 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) syz_mount_image$msdos(0x0, &(0x7f0000000480)='./bus/file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB='fscontext=\b?er_u,\x00']) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) r1 = syz_open_dev$vcsu(&(0x7f00000001c0)='/dev/vcsu#\x00', 0x3, 0x242800) ioctl$TIOCGSID(r1, 0x5429, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000340)={0x10, 0x17, 0x1, {0x7, './file1'}}, 0x10) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) mount$tmpfs(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000580)='tmpfs\x00', 0x8080, &(0x7f00000004c0)=ANY=[@ANYBLOB]) chdir(&(0x7f00000001c0)='./bus\x00') rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') creat(&(0x7f0000000180)='./bus\x00', 0x10) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, 0x0) ptrace$cont(0xe, 0x0, 0x3, 0xfffffffffffffff9) [ 1362.530161][ T7443] BPF:[1] FUNC_PROTO (anon) [ 1362.541973][ T7443] BPF:return=0 args=( [ 1362.551543][ T7443] BPF:0 (invalid-name-offset) [ 1362.566836][ T7443] BPF:, vararg 06:52:40 executing program 3: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6fe61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1362.601390][ T7443] BPF:) [ 1362.614296][ T7443] BPF: [ 1362.627545][ T7443] BPF:Invalid arg#1 [ 1362.638822][ T7449] BPF:[1] FUNC_PROTO (anon) [ 1362.640528][ T7443] BPF: [ 1362.640528][ T7443] 06:52:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4c000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:40 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, 0x0, 0x0, 0xc0c0, &(0x7f0000000380)={0xa, 0x0, 0x0, @loopback, 0x6}, 0x20) [ 1362.665797][ T7449] BPF:return=0 args=( [ 1362.675204][ T7450] device batadv_slave_1 entered promiscuous mode [ 1362.677400][ T7449] BPF:0 (invalid-name-offset) [ 1362.705885][ T7445] device batadv_slave_1 left promiscuous mode 06:52:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x2, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={r8, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) [ 1362.733906][ T7449] BPF:, 0 (anon) [ 1362.747212][ T7449] BPF:, 3 (invalid-name-offset) 06:52:40 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mmap$xdp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) [ 1362.784459][ T7449] BPF:) [ 1362.805083][ T7449] BPF: [ 1362.813580][ T7449] BPF:Invalid arg#1 [ 1362.822245][ T7462] BPF:[1] FUNC_PROTO (anon) [ 1362.830834][ T7449] BPF: [ 1362.830834][ T7449] [ 1362.839831][ T7462] BPF:return=0 args=( [ 1362.850492][ T7462] BPF:0 (invalid-name-offset) [ 1362.862641][ T7462] BPF:, vararg [ 1362.873762][ T7465] BPF:[1] FUNC_PROTO (anon) [ 1362.881771][ T7458] overlayfs: failed to resolve './file1': -2 [ 1362.884036][ T7462] BPF:) [ 1362.893417][ T7464] device batadv_slave_1 entered promiscuous mode [ 1362.900427][ T7465] BPF:return=0 args=( [ 1362.904962][ T7462] BPF: 06:52:40 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$sock_bt_hci(r0, 0x800448d2, &(0x7f0000000080)) [ 1362.910897][ T7465] BPF:0 (invalid-name-offset) [ 1362.919603][ T7462] BPF:Invalid arg#1 [ 1362.926458][ T7462] BPF: [ 1362.926458][ T7462] [ 1362.933850][ T7461] device batadv_slave_1 left promiscuous mode [ 1362.941689][ T7465] BPF:, 0 (anon) 06:52:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000100)={r7, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r4], 0x20}}, 0x0) [ 1362.963744][ T7465] BPF:, 3 (invalid-name-offset) [ 1362.977401][ T7474] BPF:[1] FUNC_PROTO (anon) [ 1362.992079][ T7465] BPF:) [ 1363.001980][ T7474] BPF:return=0 args=( [ 1363.007449][ T7465] BPF: 06:52:40 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x4020940d, &(0x7f0000000540)={0x4, 0x0, &(0x7f0000000480)=[@register_looper], 0x0, 0x0, 0x0}) [ 1363.023611][ T7465] BPF:Invalid arg#1 [ 1363.030978][ T7474] BPF:0 (invalid-name-offset) [ 1363.054068][ T7454] overlayfs: './bus' not a directory [ 1363.063306][ T7465] BPF: [ 1363.063306][ T7465] [ 1363.073151][ T7474] BPF:, vararg [ 1363.085995][ T7474] BPF:) [ 1363.100329][ T7474] BPF: [ 1363.110400][ T7474] BPF:Invalid arg#1 06:52:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4c00}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:40 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000540)={0x4, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:52:40 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x454802, 0x0) [ 1363.126652][ T7474] BPF: [ 1363.126652][ T7474] 06:52:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x60000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:41 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_INIT(r0, 0x0, 0x0) [ 1363.161678][ T7480] device batadv_slave_1 entered promiscuous mode [ 1363.185635][ T7477] device batadv_slave_1 left promiscuous mode 06:52:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000100)={r7, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r4], 0x20}}, 0x0) [ 1363.255538][ T7495] binder: 7491:7495 ioctl c0306201 20000540 returned -14 [ 1363.281439][ T7497] BPF:[1] FUNC_PROTO (anon) 06:52:41 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3, &(0x7f0000000080)=0x3, 0x7f, 0x0) mmap$xdp(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) 06:52:41 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ff9000/0x2000)=nil, 0x7fffdf006000, 0x1, 0x11, r0, 0x0) 06:52:41 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) [ 1363.303474][ T7498] BPF:[1] FUNC_PROTO (anon) [ 1363.313645][ T7497] BPF:return=0 args=( [ 1363.323014][ T7498] BPF:return=0 args=( [ 1363.335160][ T7498] BPF:0 (invalid-name-offset) [ 1363.344237][ T7497] BPF:0 (invalid-name-offset) [ 1363.361501][ T7497] BPF:, 0 (anon) [ 1363.373988][ T7498] BPF:, vararg [ 1363.378660][ T7500] device batadv_slave_1 entered promiscuous mode [ 1363.386371][ T7497] BPF:, 3 (invalid-name-offset) [ 1363.394763][ T7498] BPF:) [ 1363.403349][ T7498] BPF: [ 1363.408354][ T7496] device batadv_slave_1 left promiscuous mode [ 1363.412388][ T7497] BPF:) [ 1363.426338][ T7498] BPF:Invalid arg#1 [ 1363.433827][ T7497] BPF: [ 1363.441815][ T7498] BPF: [ 1363.441815][ T7498] [ 1363.451089][ T7497] BPF:Invalid arg#1 06:52:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000100)={r7, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r4], 0x20}}, 0x0) [ 1363.463217][ T7497] BPF: [ 1363.463217][ T7497] 06:52:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) connect$vsock_stream(r2, &(0x7f0000000040), 0x10) 06:52:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x55, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) [ 1363.492704][ T7511] BPF:[1] FUNC_PROTO (anon) [ 1363.504258][ T7511] BPF:return=0 args=( [ 1363.515155][ T7511] BPF:0 (invalid-name-offset) [ 1363.517150][ T7512] BPF:[1] FUNC_PROTO (anon) [ 1363.523339][ T7511] BPF:, vararg [ 1363.533775][ T7514] device batadv_slave_1 entered promiscuous mode [ 1363.536278][ T7512] BPF:return=0 args=( [ 1363.543302][ T7511] BPF:) [ 1363.559795][ T7512] BPF:0 (invalid-name-offset) [ 1363.560088][ T7511] BPF: [ 1363.571478][ T7513] device batadv_slave_1 left promiscuous mode [ 1363.578696][ T7512] BPF:, 0 (anon) [ 1363.596170][ T7512] BPF:, 3 (invalid-name-offset) [ 1363.602429][ T7511] BPF:Invalid arg#1 [ 1363.615014][ T7512] BPF:) [ 1363.620275][ T7511] BPF: [ 1363.620275][ T7511] [ 1363.628950][ T7512] BPF: [ 1363.649423][ T7512] BPF:Invalid arg#1 06:52:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x6000}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4d}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 06:52:41 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000100)={r7, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r4], 0x20}}, 0x0) 06:52:41 executing program 1: prctl$PR_SET_MM(0x23, 0xf, &(0x7f0000ffb000/0x1000)=nil) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) mbind(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 06:52:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x68000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:41 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') mkdir(&(0x7f0000000100)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0x40047211, &(0x7f00000000c0)={0x1}) [ 1363.676832][ T7512] BPF: [ 1363.676832][ T7512] [ 1363.767470][ T7533] device batadv_slave_1 entered promiscuous mode [ 1363.775720][ T7534] BPF:[1] FUNC_PROTO (anon) [ 1363.784823][ T7534] BPF:return=0 args=( [ 1363.786156][ T7537] BPF:[1] FUNC_PROTO (anon) [ 1363.793694][ T7523] device batadv_slave_1 left promiscuous mode [ 1363.810912][ T7537] BPF:return=0 args=( 06:52:41 executing program 3: syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x3, 0x0) 06:52:41 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000100)={r7, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r4], 0x20}}, 0x0) [ 1363.813365][ T7534] BPF:0 (invalid-name-offset) [ 1363.825889][ T7537] BPF:0 (invalid-name-offset) [ 1363.845263][ T7534] BPF:, 0 (anon) [ 1363.858934][ T7537] BPF:, vararg 06:52:41 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x6e040) 06:52:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x10, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1363.867104][ T7534] BPF:, 3 (invalid-name-offset) [ 1363.882305][ T7537] BPF:) [ 1363.889873][ T7534] BPF:) [ 1363.897983][ T7537] BPF: [ 1363.899262][ T7534] BPF: [ 1363.908540][ T7534] BPF:Invalid arg#1 [ 1363.912044][ T7537] BPF:Invalid arg#1 06:52:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x17, &(0x7f0000000080), 0x4) [ 1363.922022][ T7534] BPF: [ 1363.922022][ T7534] [ 1363.936822][ T7547] device batadv_slave_1 entered promiscuous mode [ 1363.950646][ T7537] BPF: [ 1363.950646][ T7537] [ 1363.966346][ T7542] device batadv_slave_1 left promiscuous mode [ 1363.968806][ T7548] BPF:[1] FUNC_PROTO (anon) 06:52:41 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000100)={r7, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r4], 0x20}}, 0x0) [ 1363.996179][ T7552] BPF:[1] FUNC_PROTO (anon) [ 1364.002387][ T7548] BPF:return=0 args=( [ 1364.013355][ T7548] BPF:0 (invalid-name-offset) [ 1364.019425][ T7552] BPF:return=0 args=( [ 1364.029843][ T7552] BPF:0 (invalid-name-offset) [ 1364.034750][ T7548] BPF:, 0 (anon) [ 1364.044809][ T7548] BPF:, 3 (invalid-name-offset) [ 1364.053618][ T7552] BPF:, vararg [ 1364.073760][ T7552] BPF:) [ 1364.076699][ T7548] BPF:) [ 1364.079474][ T7548] BPF: [ 1364.082250][ T7548] BPF:Invalid arg#1 [ 1364.090998][ T7552] BPF: 06:52:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x6800}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:41 executing program 0: process_vm_writev(0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/122, 0x7a}], 0x1, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 06:52:41 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mbind(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x0) 06:52:41 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) [ 1364.093807][ T7552] BPF:Invalid arg#1 [ 1364.104941][ T7552] BPF: [ 1364.104941][ T7552] [ 1364.109966][ T7548] BPF: [ 1364.109966][ T7548] [ 1364.122673][ T7555] device batadv_slave_1 entered promiscuous mode [ 1364.135700][ T7554] device batadv_slave_1 left promiscuous mode 06:52:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x6c000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x2, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={r8, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) 06:52:42 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, 0x0, 0x0) [ 1364.239597][ T7564] binder_alloc: binder_alloc_mmap_handler: 7558 20ffa000-20ffd000 already mapped failed -16 [ 1364.263228][ T7567] BPF:[1] FUNC_PROTO (anon) [ 1364.269222][ T7566] BPF:[1] FUNC_PROTO (anon) [ 1364.280601][ T7566] BPF:return=0 args=( 06:52:42 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_UNLINK(r0, 0x4161, 0x0) [ 1364.287789][ T7567] BPF:return=0 args=( [ 1364.292174][ T7566] BPF:0 (invalid-name-offset) [ 1364.299715][ T7571] binder_alloc: binder_alloc_mmap_handler: 7558 20ffa000-20ffd000 already mapped failed -16 [ 1364.300321][ T7566] BPF:, vararg [ 1364.316256][ T7567] BPF:0 (invalid-name-offset) [ 1364.331387][ T7567] BPF:, 0 (anon) [ 1364.339504][ T7567] BPF:, 3 (invalid-name-offset) [ 1364.345881][ T7570] device batadv_slave_1 entered promiscuous mode [ 1364.360060][ T7567] BPF:) [ 1364.366378][ T7568] device batadv_slave_1 left promiscuous mode [ 1364.380392][ T7566] BPF:) [ 1364.382864][ T7567] BPF: [ 1364.384850][ T7566] BPF: 06:52:42 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, 0x2) 06:52:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x2, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={r8, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) [ 1364.404103][ T7566] BPF:Invalid arg#1 [ 1364.405907][ T7567] BPF:Invalid arg#1 [ 1364.430152][ T7567] BPF: [ 1364.430152][ T7567] [ 1364.434064][ T7566] BPF: [ 1364.434064][ T7566] 06:52:42 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$alg(r0, 0x0, 0x0) 06:52:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, 0x0) [ 1364.469499][ T7583] BPF:[1] FUNC_PROTO (anon) [ 1364.470814][ T7584] BPF:[1] FUNC_PROTO (anon) [ 1364.486056][ T7584] BPF:return=0 args=( [ 1364.494052][ T7584] BPF:0 (invalid-name-offset) [ 1364.505679][ T7583] BPF:return=0 args=( [ 1364.517425][ T7585] device batadv_slave_1 entered promiscuous mode [ 1364.525983][ T7583] BPF:0 (invalid-name-offset) [ 1364.531174][ T7584] BPF:, vararg [ 1364.536894][ T7582] device batadv_slave_1 left promiscuous mode [ 1364.546186][ T7583] BPF:, 0 (anon) [ 1364.546909][ T7584] BPF:) [ 1364.562886][ T7584] BPF: [ 1364.571349][ T7583] BPF:, 3 (invalid-name-offset) [ 1364.575957][ T7584] BPF:Invalid arg#1 [ 1364.596311][ T7584] BPF: [ 1364.596311][ T7584] [ 1364.600695][ T7583] BPF:) [ 1364.613507][ T7583] BPF: [ 1364.624572][ T7583] BPF:Invalid arg#1 06:52:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x6c00}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:42 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x101102, 0x0) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x40000000000) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ff9000/0x3000)=nil, 0x3000) 06:52:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x2, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={r8, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) 06:52:42 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x89a0, &(0x7f0000000000)="55104ced") 06:52:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x74000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) 06:52:42 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000440)={0x0, 0x0, @status}) [ 1364.648994][ T7583] BPF: [ 1364.648994][ T7583] 06:52:42 executing program 0: socketpair(0x25, 0x1, 0x8000, &(0x7f0000000000)) [ 1364.764517][ T7604] device batadv_slave_1 entered promiscuous mode [ 1364.784987][ T7616] BPF:[1] FUNC_PROTO (anon) [ 1364.792965][ T7599] device batadv_slave_1 left promiscuous mode 06:52:42 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000016c00)={0x5, 0x2, 0x0, 0x1}, 0x40) 06:52:42 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x6f80, 0x0) [ 1364.822326][ T7618] BPF:[1] FUNC_PROTO (anon) [ 1364.826738][ T7616] BPF:return=0 args=( [ 1364.834648][ T7618] BPF:return=0 args=( [ 1364.854245][ T7618] BPF:0 (invalid-name-offset) [ 1364.860046][ T7616] BPF:0 (invalid-name-offset) 06:52:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x2, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={r8, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) [ 1364.871897][ T7618] BPF:, 0 (anon) [ 1364.887237][ T7618] BPF:, 3 (invalid-name-offset) [ 1364.894455][ T7616] BPF:, vararg [ 1364.904978][ T7616] BPF:) [ 1364.912925][ T7616] BPF: [ 1364.915838][ T7618] BPF:) 06:52:42 executing program 0: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000000)=0x2, 0x5, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) 06:52:42 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) [ 1364.929831][ T7618] BPF: [ 1364.933473][ T7616] BPF:Invalid arg#1 [ 1364.941342][ T7618] BPF:Invalid arg#1 [ 1364.963381][ T7618] BPF: [ 1364.963381][ T7618] [ 1364.969814][ T7616] BPF: [ 1364.969814][ T7616] [ 1364.985401][ T7628] device batadv_slave_1 entered promiscuous mode [ 1365.004093][ T7631] BPF:[1] FUNC_PROTO (anon) [ 1365.010875][ T7634] BPF:[1] FUNC_PROTO (anon) [ 1365.015550][ T7623] device batadv_slave_1 left promiscuous mode [ 1365.030070][ T7631] BPF:return=0 args=( [ 1365.042637][ T7634] BPF:return=0 args=( [ 1365.047719][ T7631] BPF:0 (invalid-name-offset) [ 1365.057925][ T7634] BPF:0 (invalid-name-offset) [ 1365.064268][ T7631] BPF:, 0 (anon) [ 1365.077550][ T7631] BPF:, 3 (invalid-name-offset) [ 1365.087878][ T7634] BPF:, vararg [ 1365.096487][ T7631] BPF:) [ 1365.101454][ T7634] BPF:) [ 1365.109621][ T7631] BPF: [ 1365.110996][ T7634] BPF: [ 1365.114148][ T7631] BPF:Invalid arg#1 [ 1365.121838][ T7634] BPF:Invalid arg#1 [ 1365.130844][ T7634] BPF: [ 1365.130844][ T7634] [ 1365.135092][ T7631] BPF: [ 1365.135092][ T7631] 06:52:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x7400}, {}, {0xd, 0x3}]}]}}, &(0x7f0000000140)=""/161, 0x3e, 0xa1, 0x8}, 0x20) 06:52:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_IGNORE_DF={0x5, 0x13, 0x1}]}}}]}, 0x38}}, 0x0) 06:52:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$packet(0x11, 0x2, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={r8, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d04800000000000000010000000", @ANYRES32=r5], 0x20}}, 0x0) 06:52:42 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x1600, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 06:52:42 executing program 0: syz_mount_image$affs(0x0, 0x0, 0x0, 0x0, &(0x7f0000002880), 0x0, 0x0) syz_mount_image$erofs(0x0, 0x0, 0x0, 0x0, &(0x7f0000004ac0), 0x0, 0x0) 06:52:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7a000000}, {}]}]}}, &(0x7f0000000140)=""/161, 0x36, 0xa1, 0x8}, 0x20) [ 1365.262343][ T7656] BPF:[1] FUNC_PROTO (anon) 06:52:43 executing program 1: prctl$PR_SET_MM(0x23, 0xf, &(0x7f0000ffb000/0x1000)=nil) mbind(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, &(0x7f0000000000)=0x1, 0x4, 0x2) 06:52:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_IGNORE_DF={0x5, 0x13, 0x1}]}}}]}, 0x38}}, 0x0) [ 1365.288763][ T7650] device batadv_slave_1 entered promiscuous mode [ 1365.295418][ T7656] BPF:return=0 args=( [ 1365.306272][ T7657] BPF:[1] FUNC_PROTO (anon) [ 1365.313892][ T7656] BPF:0 (invalid-name-offset) [ 1365.325355][ T7656] BPF:, vararg [ 1365.332941][ T7643] device batadv