x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r0, r1, &(0x7f0000000240)=0x202, 0x4000000000dc) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000000)={0x4b, 0x0, 0x9, 0x0, 0xffffff22, 0x7, 0x0, 0x7, 0x1, 0x40, 0x3, 0x6, 0x0, 0x8, 0x4a3, 0x8, 0x5, 0x20, 0x7f, [], 0xc1, 0x7}) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x10, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}}, 0x20000011) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r4, r5, &(0x7f0000000240)=0x202, 0x4000000000dc) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r8}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000040)={@rand_addr="08b9b5ab0e66cea70eb52ba7583224ce", r8}, 0x14) preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) bind$netlink(r2, &(0x7f0000000340)={0x10, 0x0, 0x25dfdbfe, 0x20404000}, 0xc) [ 954.475470][T31525] BPF: [ 954.491388][T31489] fuse: Bad value for 'user_id' [ 954.498450][T31525] BPF:Invalid member name_offset:96 [ 954.520409][T31525] BPF: [ 954.520409][T31525] 16:35:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 954.552223][T31525] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 954.607453][T31525] BPF: [ 954.629377][T31525] BPF:Invalid member name_offset:96 16:35:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') ioctl$KDFONTOP_COPY(r2, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0x7, 0x1e, 0x38, &(0x7f0000000240)}) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 954.674692][T31525] BPF: [ 954.674692][T31525] 16:35:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x68, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 955.002639][T31543] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 16:35:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 955.059560][T31543] BPF: [ 955.062395][T31543] BPF:Invalid member name_offset:104 [ 955.067704][T31543] BPF: [ 955.067704][T31543] 16:35:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000001c0), 0x0) close(r2) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000000c0)=0xffffff7f, 0x4) 16:35:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x2040c01, &(0x7f00000003c0)={'trans=unix,', {[{@uname={'uname', 0x3d, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}}, {@debug={'debug', 0x3d, 0x1000}}, {@posixacl='posixacl'}, {@version_9p2000='version=9p2000'}, {@access_any='access=any'}, {@noextend='noextend'}, {@aname={'aname', 0x3d, 'aead\x00'}}, {@access_any='access=any'}, {@noextend='noextend'}, {@fscache='fscache'}], [{@seclabel='seclabel'}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}, {@subj_type={'subj_type', 0x3d, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@uid_lt={'uid<', r4}}, {@context={'context', 0x3d, 'user_u'}}]}}) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 955.133683][T31543] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 955.164606][T31543] BPF: [ 955.175789][T31543] BPF:Invalid member name_offset:104 [ 955.196444][T31543] BPF: [ 955.196444][T31543] 16:35:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r0, 0x0, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000480)=""/4096, 0xfffffd68}, {&(0x7f00000000c0)=""/88, 0x4e}], 0x2, 0x0) 16:35:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x6c, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) unshare(0x80) clone3(&(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x50) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) fsconfig$FSCONFIG_SET_FLAG(r2, 0x0, &(0x7f0000000240)='async\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) connect$rxrpc(r3, &(0x7f0000000100)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e20, 0x1f, @rand_addr="e95b36dfd6bef27d7749bb76191ce22d", 0x1000}}, 0x24) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x40) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 955.578493][T31568] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 955.596966][T31568] BPF: [ 955.603784][T31568] BPF:Invalid member name_offset:108 16:35:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20000000400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r2, 0x80000000}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000040)={r2, @in6={{0xa, 0x4e22, 0xf6a, @dev={0xfe, 0x80, [], 0x3b}, 0xa9e}}, 0xb0, 0x46d, 0x81, 0x1, 0xf966}, &(0x7f0000000100)=0x98) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') preadv(r3, &(0x7f00000017c0), 0x1d0, 0x0) [ 955.626405][T31568] BPF: [ 955.626405][T31568] [ 955.655628][T31568] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 955.692440][T31568] BPF: [ 955.712358][T31568] BPF:Invalid member name_offset:108 [ 955.739774][T31568] BPF: [ 955.739774][T31568] 16:35:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x74, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 956.120789][T31581] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 956.181740][T31581] BPF: [ 956.209083][T31581] BPF:Invalid member name_offset:116 [ 956.219155][T31581] BPF: [ 956.219155][T31581] 16:35:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 956.254457][T31581] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 16:35:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x1, 0x0) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000100)={0x6, 0xffffffffffff8783}) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 956.299070][T31581] BPF: [ 956.315005][T31581] BPF:Invalid member name_offset:116 [ 956.365999][T31581] BPF: [ 956.365999][T31581] 16:35:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x4e22, 0x7, @mcast1, 0x5}, @in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x23}}, @in6={0xa, 0x4e24, 0x20, @empty, 0x7f}, @in6={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x35}, 0x1}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e23, 0x77, @local, 0x3ff}, @in6={0xa, 0x4e24, 0x5, @rand_addr="65d18f19bc5bdf9fa43655ea89299dc3", 0x8}], 0xbc) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000000)) preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) 16:35:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x8c083, 0x30) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000100)={'gretap0\x00'}) r3 = socket$inet6(0xa, 0x3, 0x6) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = socket$inet6(0xa, 0x3, 0x6) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000240)=0x202, 0x4000000000dc) ioctl$SNDRV_PCM_IOCTL_REWIND(0xffffffffffffffff, 0x40084146, &(0x7f0000000280)=0x7) ioctl$VIDIOC_G_EDID(0xffffffffffffffff, 0xc0285628, &(0x7f0000000240)={0x0, 0xff, 0x4, [], &(0x7f0000000180)}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x7a, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 956.713953][T31602] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 956.729276][T31602] BPF: [ 956.738504][T31602] BPF:Invalid member name_offset:122 [ 956.805087][T31602] BPF: [ 956.805087][T31602] [ 956.921938][T31602] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 956.950419][T31602] BPF: [ 956.953510][T31602] BPF:Invalid member name_offset:122 [ 957.004006][T31602] BPF: [ 957.004006][T31602] 16:35:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r1, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r7 = accept$alg(r6, 0x0, 0x0) sendmmsg$alg(r7, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r8 = dup2(r4, r7) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, &(0x7f00000004c0)=r8) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r9, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010003b0dfff300"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r9, @ANYBLOB="140012000b000100627269646765000004000200"], 0x3c}}, 0x6000000) ioctl$sock_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={0x0, @can={0x1d, r9}, @nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x200000}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1ff, 0x0, 0x0, 0x0, 0x80, &(0x7f0000000000)='macvlan1\x00', 0x7, 0x5, 0x81}) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@loopback, @in=@empty, 0x4e24, 0xff, 0x4e21, 0x3, 0x2, 0x20, 0x80, 0x32, r10, r11}, {0x0, 0x80, 0x2, 0x2, 0x8, 0xdb, 0x3e8, 0x1}, {0x2, 0x5, 0x5, 0xfffffffffffffffe}, 0x9, 0x6e6bbc, 0x2, 0x0, 0x1, 0x3}, {{@in=@multicast1, 0x4d6, 0x5e}, 0x25677436e17a2876, @in=@multicast2, 0x3506, 0x0, 0x3, 0x6, 0x8, 0x9, 0xffffffff}}, 0xe8) 16:35:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0xd1, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 957.486797][T31622] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 957.522936][T31622] BPF: 16:35:13 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000300), &(0x7f0000000340)=0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) ioctl$SNDRV_PCM_IOCTL_WRITEI_FRAMES(r3, 0x40184150, &(0x7f0000000100)={0x0, &(0x7f00000000c0)="d80f6ff17d20c6fdca84041ebea17174c4f17170bef47ac554c7ba3e7a9c2f94", 0x20}) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NFQNL_MSG_CONFIG(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, 0x2, 0x3, 0x201, 0x0, 0x0, {0x0, 0x0, 0x1}, [@NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x7}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0xffffffff}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x2}, @NFQA_CFG_CMD={0x8, 0x1, {0x3, 0x0, 0x2}}]}, 0x34}, 0x1, 0x0, 0x0, 0x4040001}, 0x50) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 957.550224][T31622] BPF:Invalid member name_offset:209 [ 957.589661][T31622] BPF: [ 957.589661][T31622] [ 957.631629][T31622] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 957.667455][T31622] BPF: [ 957.681106][T31622] BPF:Invalid member name_offset:209 16:35:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80808, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffff, 0x9}}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r2, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x81000) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 957.710152][T31622] BPF: [ 957.710152][T31622] [ 957.712336][T31631] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 16:35:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbf", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x300, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r1, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:inetd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip_vti0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @broadcast}]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x200048c4) [ 958.137540][T31647] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 958.189416][T31647] BPF: 16:35:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a2, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x222880, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r5, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x8, 0x100010, r5, 0x8000000) getpeername$l2tp6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000240)=0x20) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 958.211457][T31647] BPF:Invalid member name_offset:768 [ 958.253620][T31636] bond1: (slave bridge2): making interface the new active one [ 958.253733][T31647] BPF: [ 958.253733][T31647] 16:35:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbf", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 958.307503][T31647] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 958.359234][T31647] BPF: [ 958.375850][T31647] BPF:Invalid member name_offset:768 [ 958.419420][T31636] bond1: (slave bridge2): Enslaving as an active interface with an up link [ 958.429029][T31647] BPF: [ 958.429029][T31647] [ 958.470349][T31642] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 16:35:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x500, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:14 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000080)=0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x404, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cachetag={'cachetag', 0x3d, 'net/nf_conntrack_expect\x00'}}, {@mmap='mmap'}], [{@subj_user={'subj_user', 0x3d, 'keyring%selinuxvboxnet1['}}, {@euid_eq={'euid', 0x3d, r2}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, 'proclowlan0[Z@eth1selfbdev)/)userproc'}}, {@dont_appraise='dont_appraise'}]}}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = syz_open_procfs(r3, &(0x7f0000000200)='net/nf_conntrack_expect\x00') preadv(r4, &(0x7f00000017c0), 0x1d0, 0x0) 16:35:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbf", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 958.780810][T31663] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 958.819986][T31663] BPF: 16:35:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x84000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) sysfs$2(0x2, 0x5db3, &(0x7f0000000300)=""/166) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) r2 = openat(r1, &(0x7f00000000c0)='./file0\x00', 0x802, 0x80) ioctl$NBD_SET_TIMEOUT(r2, 0xab09, 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x6, 0x84000) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000180)={&(0x7f0000000240)=""/177, 0x20a000, 0x0, 0xffff, 0x2}, 0x20) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 958.836290][T31663] BPF:Invalid member name_offset:1280 [ 958.849172][T31663] BPF: [ 958.849172][T31663] [ 958.862301][T31663] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 958.885930][T31663] BPF: [ 958.894643][T31663] BPF:Invalid member name_offset:1280 [ 958.907662][T31663] BPF: [ 958.907662][T31663] 16:35:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x48, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x600, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0xffffffffffffffff, 0x6, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x5) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') r1 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffa, 0x2c2000) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f00000000c0)={{0x2, 0x0, @identifier="ab913aae88be68a5eddbba3199c25f15"}}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) write$P9_RWSTAT(r2, &(0x7f0000000140)={0x7, 0x7f, 0x2}, 0x7) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 16:35:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 959.281494][T31685] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 959.317526][T31685] BPF: 16:35:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbf", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 959.327923][T31685] BPF:Invalid member name_offset:1536 [ 959.344892][T31685] BPF: [ 959.344892][T31685] [ 959.381392][T31685] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 959.404517][T31685] BPF: [ 959.407495][T31685] BPF:Invalid member name_offset:1536 [ 959.432350][T31685] BPF: [ 959.432350][T31685] 16:35:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x700, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000240)={0x1f, 0x8, 0x4, 0x2, 0x1, {}, {0x5, 0x2, 0x3, 0x7f, 0x80, 0x8, "087ff93e"}, 0x2, 0x2, @planes=&(0x7f00000000c0)={0x1, 0x80000000, @mem_offset=0x4, 0x7}, 0x7f, 0x0, 0xffffffffffffffff}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r4, 0x0, 0x0) r5 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x3ff, 0x0, 0x1}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r7, 0x0, 0x10}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r7, 0x0, 0x8}, 0xc) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r9, 0x0, 0x0) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r10, 0x0, 0x0) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r11, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r11, 0x0, 0x0) r12 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x202, 0x0) ppoll(&(0x7f0000000340)=[{r3, 0x2}, {r4, 0x4000}, {r5, 0x400}, {r8, 0x20a8}, {r9, 0x84}, {r10, 0x6150}, {r2, 0x202}, {r11, 0x90c0}, {r12, 0x100}], 0x9, &(0x7f00000003c0)={0x77359400}, &(0x7f0000000400)={[0xa96]}, 0x8) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 959.682882][T31703] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 959.735043][T31703] BPF: [ 959.748607][T31703] BPF:Invalid member name_offset:1792 [ 959.763120][T31703] BPF: [ 959.763120][T31703] [ 959.858058][T31703] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 16:35:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 959.941689][T31703] BPF: [ 959.944658][T31703] BPF:Invalid member name_offset:1792 [ 959.963122][T31703] BPF: [ 959.963122][T31703] 16:35:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbf", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0xa00, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 960.355376][T31714] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 960.431571][T31714] BPF: [ 960.457228][T31714] BPF:Invalid member name_offset:2560 [ 960.482748][T31714] BPF: [ 960.482748][T31714] [ 960.517947][T31714] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 16:35:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 960.569510][T31714] BPF: [ 960.578082][T31714] BPF:Invalid member name_offset:2560 [ 960.634444][T31714] BPF: [ 960.634444][T31714] 16:35:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x2000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x84000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) sysfs$2(0x2, 0x5db3, &(0x7f0000000300)=""/166) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) r2 = openat(r1, &(0x7f00000000c0)='./file0\x00', 0x802, 0x80) ioctl$NBD_SET_TIMEOUT(r2, 0xab09, 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x6, 0x84000) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000180)={&(0x7f0000000240)=""/177, 0x20a000, 0x0, 0xffff, 0x2}, 0x20) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = socket$inet6(0xa, 0x3, 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r4, 0x80000000}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={r4, @in6={{0xa, 0x4e23, 0x101, @loopback, 0x81}}, 0x1, 0x7ff, 0x100, 0x0, 0xa, 0x8338, 0x81}, &(0x7f00000000c0)=0x9c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000100)={r5, 0x7ff}, 0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r6, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) setsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000180)={0x0, 0xffe0, 0xfff7, 0x5, 0x4, 0x74, 0x3}, 0xc) r7 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r7, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:17 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r2 = accept$alg(r1, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r3, 0x0, 0x0) dup(r3) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r4, r5, &(0x7f0000000240)=0x202, 0x4000000000dc) ioctl$SIOCX25SDTEFACILITIES(r5, 0x89eb, &(0x7f00000000c0)={0x7f, 0x81, 0x590a, 0x9e, 0x3, 0x1d, 0xd, "95fa2f658a90be3ae510e9af2cb04fdd05ccd473", "2bac4efbab1982f0f7af8deaf88374c005bf2d2d"}) sendmmsg$alg(r0, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x80) recvmsg(r2, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r6, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) ioctl$VT_ACTIVATE(r6, 0x5606, 0x1) [ 960.905175][T31735] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 960.949013][T31735] BPF: [ 960.955350][T31735] BPF:Invalid member name_offset:8192 16:35:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 961.053576][T31735] BPF: [ 961.053576][T31735] [ 961.081767][T31735] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 961.109744][T31735] BPF: [ 961.117833][T31735] BPF:Invalid member name_offset:8192 [ 961.143810][T31735] BPF: [ 961.143810][T31735] 16:35:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x24, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r3, 0x8982, &(0x7f00000000c0)={0x8, 'wg2\x00', {'syz_tun\x00'}, 0x6b0}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x2400, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[@ANYBLOB="90000000", @ANYRES16=r3, @ANYBLOB="000225bd7000fbdbdf250200000020000c80040002000800010000000000080001008403000008000100008000005c000180140002800800030009000000080003000700000044000400200001000a004e193fdf4506ff02000800000000000000000000000102000000200002000a004e2400000008ff01000000000000000000000000000181000000"], 0x90}, 0x1, 0x0, 0x0, 0x40000}, 0x40004) accept$alg(r1, 0x0, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-cast6-avx\x00'}, 0x58) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r4, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00') setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r5 = accept$alg(r0, 0x0, 0x0) fdatasync(0xffffffffffffffff) sendmmsg$alg(r5, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r5, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) timer_create(0x2, &(0x7f00000000c0)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000100)=0x0) timer_delete(r6) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 961.521410][T31753] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 16:35:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r4, r5, &(0x7f0000000240)=0x202, 0x4000000000dc) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000000c0)) sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) mmap$snddsp_control(&(0x7f0000ffc000/0x3000)=nil, 0x1000, 0x2000004, 0x10, r3, 0x83000000) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000100)={0x4, 0x6, 0xc1, 0x84000}) [ 961.588237][T31753] BPF: [ 961.612624][T31753] BPF:Invalid member name_offset:9216 [ 961.632669][T31753] BPF: [ 961.632669][T31753] [ 961.695781][T31753] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 961.745101][T31753] BPF: [ 961.760144][T31753] BPF:Invalid member name_offset:9216 [ 961.795035][T31753] BPF: [ 961.795035][T31753] 16:35:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[@ANYBLOB="90000000", @ANYRES16=r3, @ANYBLOB="000225bd7000fbdbdf250200000020000c80040002000800010000000000080001008403000008000100008000005c000180140002800800030009000000080003000700000044000400200001000a004e193fdf4506ff02000800000000000000000000000102000000200002000a004e2400000008ff01000000000000000000000000000181000000"], 0x90}, 0x1, 0x0, 0x0, 0x40000}, 0x40004) accept$alg(r1, 0x0, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-cast6-avx\x00'}, 0x58) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r4, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00') setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r5 = accept$alg(r0, 0x0, 0x0) fdatasync(0xffffffffffffffff) sendmmsg$alg(r5, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r5, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) timer_create(0x2, &(0x7f00000000c0)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000100)=0x0) timer_delete(r6) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 962.300587][T31770] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 962.356385][T31770] BPF: [ 962.369034][T31770] BPF:Invalid member name_offset:12288 16:35:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7000000", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 962.419242][T31770] BPF: [ 962.419242][T31770] [ 962.427857][T31770] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 962.466523][T31770] BPF: [ 962.480833][T31770] BPF:Invalid member name_offset:12288 [ 962.533877][T31770] BPF: [ 962.533877][T31770] 16:35:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3200, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r2, 0x0, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha512\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 962.851899][T31788] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 16:35:19 executing program 1: syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0x80000001, 0x505880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x620600, 0x0) bind$bt_l2cap(r1, &(0x7f0000000100)={0x1f, 0x4, @none, 0x5, 0x1}, 0xe) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) ioctl$SIOCX25SCAUSEDIAG(r3, 0x89ec, &(0x7f0000000180)={0x7, 0x7b}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r4, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8b22, &(0x7f0000000400)='wlan0\x00\xd6\xb1?\xc7\x9f\x1eW\xbe\xf7\x8aa\xc7Mz\xee\xac\xd4_B~NjO\x9bK\xec\xbc\"\r\xfa\x81J\x13\xd8\x9fg}r\xd3\xb4\xf6t\x80\xcc\x99\x17\x1eSp\x1c<\xfd;\x11\n\xfe\x8d\x1d\x8c\xfc\xa4\xe6\xddS\xcc\xcc\xfd\xb5\xfb\x01\xaf\xf8\xe4\xec\xc5q9\xba\x15;1$\x04=\x92\xb0M\xc5\a\x95\xf9\x83\xf9\xe2\xdeBk\x19\x13\x86-\xcd N\x92\x167rp7\xf5\xd3\x98 \x13\xda\xd4\xb9\xcf\xf7=\xc5>\x99\xfb\x9f\xb3\xdf\x8fe qN\xccR\xda\xbe\xa6\x04\xe6') accept4$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x0, @fixed}, &(0x7f0000000040)=0xe, 0x80800) r7 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x52080, 0x0) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x1c, r8, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}]}, 0x1c}}, 0x0) r9 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) getpeername$packet(r11, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r9, 0x890b, &(0x7f00000000c0)={@dev, @mcast1, @rand_addr="657261c70996f4e1596272e2ec4688fa", 0x0, 0x0, 0x0, 0x10, 0x0, 0x20c204c6, r12}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xe8) r14 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = dup(r15) getpeername$packet(r16, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r14, 0x890b, &(0x7f00000000c0)={@dev, @mcast1, @rand_addr="657261c70996f4e1596272e2ec4688fa", 0x0, 0x0, 0x0, 0x10, 0x0, 0x20c204c6, r17}) sendmsg$NL80211_CMD_GET_WIPHY(r7, &(0x7f0000000440)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r8, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r12}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r13}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r17}]}, 0x34}, 0x1, 0x0, 0x0, 0x6}, 0x4000) r18 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r18, &(0x7f0000000140), 0x10) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$can_bcm(r18, &(0x7f0000000200)={&(0x7f0000000000)={0x1d, r20}, 0x10, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="00230000000000000000000000000000bb45897455d1", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000000000006c8dc8ac97baed61"], 0x48}}, 0x0) r21 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r21, &(0x7f0000000140), 0x10) r22 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r22, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r22, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$can_bcm(r21, &(0x7f0000000200)={&(0x7f0000000000)={0x1d, r23}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "6c8dc8ac97baed61"}}, 0x48}}, 0x0) r24 = socket$alg(0x26, 0x5, 0x0) bind$alg(r24, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r24, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r25 = accept$alg(r24, 0x0, 0x0) sendmmsg$alg(r25, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r25, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r6, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="c837493fbaf4d129527f9b09b0a8e800", @ANYRES16=r25, @ANYBLOB="000226bd7000fcdbdf25130000000c004300fcffffffffffff7f0500190000000000140011800400040004000100040001000400050006001a010300000008000300", @ANYRES32=r20, @ANYBLOB="08000300", @ANYRES32=r23, @ANYBLOB="04001180"], 0x7}, 0x1, 0x0, 0x0, 0x20000051}, 0x0) sendmsg$NL80211_CMD_SET_BSS(r4, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x68, r8, 0x20, 0x70bd2c, 0x25dfdbfd, {}, [@NL80211_ATTR_BSS_SHORT_SLOT_TIME={0x5, 0x1e, 0x6}, @NL80211_ATTR_BSS_SHORT_SLOT_TIME={0x5, 0x1e, 0x1}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x1}}, @NL80211_ATTR_AP_ISOLATE={0x5, 0x60, 0x9}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0x1}, @NL80211_ATTR_AP_ISOLATE={0x5, 0x60, 0x8}, @NL80211_ATTR_AP_ISOLATE={0x5, 0x60, 0x6}, @NL80211_STA_WME_MAX_SP={0xd, 0x2, "383f725630852771fd"}, @NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0xfc}]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x4010) r26 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r26, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r26, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 962.924618][T31788] BPF: [ 962.939138][T31788] BPF:Invalid member name_offset:12800 [ 962.945126][T31788] BPF: [ 962.945126][T31788] [ 962.966362][T31788] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 962.994161][T31788] BPF: [ 963.001795][T31788] BPF:Invalid member name_offset:12800 [ 963.048756][T31788] BPF: [ 963.048756][T31788] 16:35:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbf", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7000000", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x4800, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x12f400, 0x0) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f00000000c0)={0x66, @broadcast, 0x4e22, 0x3, 'fo\x00', 0x10, 0x2, 0x2f}, 0x2c) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 963.330961][T31804] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 963.390130][T31804] BPF: [ 963.393160][T31804] BPF:Invalid member name_offset:18432 [ 963.449076][T31804] BPF: [ 963.449076][T31804] [ 963.503582][T31804] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 16:35:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7000000", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 963.564977][T31804] BPF: [ 963.567881][T31804] BPF:Invalid member name_offset:18432 [ 963.639507][T31804] BPF: [ 963.639507][T31804] 16:35:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x4c00, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 964.059973][T31822] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 964.099154][T31822] BPF: [ 964.102107][T31822] BPF:Invalid member name_offset:19456 16:35:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f00000000c0)={0x3, 'veth1\x00', {0xb400}, 0x20}) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 964.129349][T31822] BPF: [ 964.129349][T31822] 16:35:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 964.171591][T31822] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 964.258829][T31822] BPF: [ 964.292686][T31822] BPF:Invalid member name_offset:19456 [ 964.324170][T31822] BPF: [ 964.324170][T31822] 16:35:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x6000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r5 = accept$alg(r4, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r5, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) recvmmsg(r5, &(0x7f0000000e80)=[{{&(0x7f00000000c0)=@isdn, 0x80, &(0x7f0000000180)=[{&(0x7f0000000240)=""/182, 0xb6}, {&(0x7f0000000300)=""/228, 0xe4}, {&(0x7f0000000400)=""/148, 0x94}, {&(0x7f00000004c0)=""/130, 0x82}], 0x4, &(0x7f0000000580)=""/160, 0xa0}, 0x9}, {{&(0x7f0000000640)=@phonet, 0x80, &(0x7f00000008c0)=[{&(0x7f00000006c0)=""/114, 0x72}, {&(0x7f0000000740)=""/69, 0x45}, {&(0x7f00000007c0)=""/116, 0x74}, {&(0x7f0000000840)=""/10, 0xa}, {&(0x7f0000000880)=""/11, 0xb}], 0x5, &(0x7f0000000940)=""/92, 0x5c}, 0x3}, {{&(0x7f00000009c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000a40)=""/62, 0x3e}, {&(0x7f0000000a80)=""/160, 0xa0}, {&(0x7f0000000b40)=""/170, 0xaa}, {&(0x7f0000000c00)=""/39, 0x27}], 0x4, &(0x7f0000000c80)=""/34, 0x22}, 0xfff}, {{&(0x7f0000000cc0)=@caif=@util, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000d40)=""/35, 0x23}, {&(0x7f0000000d80)=""/159, 0x9f}], 0x2}, 0xffffff01}], 0x4, 0x2000, &(0x7f0000000f80)={0x77359400}) setsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f0000000fc0)=0x7, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:20 executing program 4: syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0x80000001, 0x505880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x620600, 0x0) bind$bt_l2cap(r1, &(0x7f0000000100)={0x1f, 0x4, @none, 0x5, 0x1}, 0xe) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) ioctl$SIOCX25SCAUSEDIAG(r3, 0x89ec, &(0x7f0000000180)={0x7, 0x7b}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r4, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8b22, &(0x7f0000000400)='wlan0\x00\xd6\xb1?\xc7\x9f\x1eW\xbe\xf7\x8aa\xc7Mz\xee\xac\xd4_B~NjO\x9bK\xec\xbc\"\r\xfa\x81J\x13\xd8\x9fg}r\xd3\xb4\xf6t\x80\xcc\x99\x17\x1eSp\x1c<\xfd;\x11\n\xfe\x8d\x1d\x8c\xfc\xa4\xe6\xddS\xcc\xcc\xfd\xb5\xfb\x01\xaf\xf8\xe4\xec\xc5q9\xba\x15;1$\x04=\x92\xb0M\xc5\a\x95\xf9\x83\xf9\xe2\xdeBk\x19\x13\x86-\xcd N\x92\x167rp7\xf5\xd3\x98 \x13\xda\xd4\xb9\xcf\xf7=\xc5>\x99\xfb\x9f\xb3\xdf\x8fe qN\xccR\xda\xbe\xa6\x04\xe6') accept4$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x0, @fixed}, &(0x7f0000000040)=0xe, 0x80800) r7 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x52080, 0x0) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x1c, r8, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}]}, 0x1c}}, 0x0) r9 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) getpeername$packet(r11, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r9, 0x890b, &(0x7f00000000c0)={@dev, @mcast1, @rand_addr="657261c70996f4e1596272e2ec4688fa", 0x0, 0x0, 0x0, 0x10, 0x0, 0x20c204c6, r12}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xe8) r14 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = dup(r15) getpeername$packet(r16, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r14, 0x890b, &(0x7f00000000c0)={@dev, @mcast1, @rand_addr="657261c70996f4e1596272e2ec4688fa", 0x0, 0x0, 0x0, 0x10, 0x0, 0x20c204c6, r17}) sendmsg$NL80211_CMD_GET_WIPHY(r7, &(0x7f0000000440)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r8, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r12}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r13}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r17}]}, 0x34}, 0x1, 0x0, 0x0, 0x6}, 0x4000) r18 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r18, &(0x7f0000000140), 0x10) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$can_bcm(r18, &(0x7f0000000200)={&(0x7f0000000000)={0x1d, r20}, 0x10, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="00230000000000000000000000000000bb45897455d1", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000000000006c8dc8ac97baed61"], 0x48}}, 0x0) r21 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r21, &(0x7f0000000140), 0x10) r22 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r22, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r22, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$can_bcm(r21, &(0x7f0000000200)={&(0x7f0000000000)={0x1d, r23}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "6c8dc8ac97baed61"}}, 0x48}}, 0x0) r24 = socket$alg(0x26, 0x5, 0x0) bind$alg(r24, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r24, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r25 = accept$alg(r24, 0x0, 0x0) sendmmsg$alg(r25, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r25, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r6, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="c837493fbaf4d129527f9b09b0a8e800", @ANYRES16=r25, @ANYBLOB="000226bd7000fcdbdf25130000000c004300fcffffffffffff7f0500190000000000140011800400040004000100040001000400050006001a010300000008000300", @ANYRES32=r20, @ANYBLOB="08000300", @ANYRES32=r23, @ANYBLOB="04001180"], 0x7}, 0x1, 0x0, 0x0, 0x20000051}, 0x0) sendmsg$NL80211_CMD_SET_BSS(r4, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x68, r8, 0x20, 0x70bd2c, 0x25dfdbfd, {}, [@NL80211_ATTR_BSS_SHORT_SLOT_TIME={0x5, 0x1e, 0x6}, @NL80211_ATTR_BSS_SHORT_SLOT_TIME={0x5, 0x1e, 0x1}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x1}}, @NL80211_ATTR_AP_ISOLATE={0x5, 0x60, 0x9}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0x1}, @NL80211_ATTR_AP_ISOLATE={0x5, 0x60, 0x8}, @NL80211_ATTR_AP_ISOLATE={0x5, 0x60, 0x6}, @NL80211_STA_WME_MAX_SP={0xd, 0x2, "383f725630852771fd"}, @NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0xfc}]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x4010) r26 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r26, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r26, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 964.622935][T31835] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 16:35:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 964.676322][T31835] BPF: [ 964.709192][T31835] BPF:Invalid member name_offset:24576 [ 964.714724][T31835] BPF: [ 964.714724][T31835] [ 964.741556][T31835] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 964.803778][T31835] BPF: [ 964.827940][T31835] BPF:Invalid member name_offset:24576 [ 964.834902][T31835] BPF: [ 964.834902][T31835] 16:35:21 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x6800, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 965.196136][T31850] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 965.250662][T31850] BPF: [ 965.268775][T31850] BPF:Invalid member name_offset:26624 [ 965.310617][T31850] BPF: [ 965.310617][T31850] [ 965.340791][T31850] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 16:35:21 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) syz_open_dev$swradio(&(0x7f00000002c0)='/dev/swradio#\x00', 0x0, 0x2) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = getpid() r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) keyctl$chown(0x4, 0x0, 0x0, r7) r8 = getegid() getgroups(0x7, &(0x7f00000021c0)=[0x0, 0x0, 0x0, r7, 0xffffffffffffffff, 0x0, r8]) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={r4, r6, r8}, 0xc) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 965.382557][T31850] BPF: [ 965.399196][T31850] BPF:Invalid member name_offset:26624 [ 965.435601][T31850] BPF: [ 965.435601][T31850] 16:35:21 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x6c00, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000240)={@default, @default, @default, 0x6, 0x6, 0x1, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x105400, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f0000000100)=@rose={'rose', 0x0}, 0x10) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x890420, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) fchmodat(r3, &(0x7f0000000480)='./file0\x00', 0x8) [ 965.803783][T31863] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 965.822325][T31863] BPF: [ 965.848489][T31863] BPF:Invalid member name_offset:27648 [ 965.879969][T31863] BPF: [ 965.879969][T31863] [ 965.932035][T31863] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 965.972239][T31863] BPF: [ 966.022313][T31863] BPF:Invalid member name_offset:27648 [ 966.062792][T31863] BPF: [ 966.062792][T31863] 16:35:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x7400, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r5 = accept$alg(r4, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r5, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) recvmmsg(r5, &(0x7f0000000e80)=[{{&(0x7f00000000c0)=@isdn, 0x80, &(0x7f0000000180)=[{&(0x7f0000000240)=""/182, 0xb6}, {&(0x7f0000000300)=""/228, 0xe4}, {&(0x7f0000000400)=""/148, 0x94}, {&(0x7f00000004c0)=""/130, 0x82}], 0x4, &(0x7f0000000580)=""/160, 0xa0}, 0x9}, {{&(0x7f0000000640)=@phonet, 0x80, &(0x7f00000008c0)=[{&(0x7f00000006c0)=""/114, 0x72}, {&(0x7f0000000740)=""/69, 0x45}, {&(0x7f00000007c0)=""/116, 0x74}, {&(0x7f0000000840)=""/10, 0xa}, {&(0x7f0000000880)=""/11, 0xb}], 0x5, &(0x7f0000000940)=""/92, 0x5c}, 0x3}, {{&(0x7f00000009c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000a40)=""/62, 0x3e}, {&(0x7f0000000a80)=""/160, 0xa0}, {&(0x7f0000000b40)=""/170, 0xaa}, {&(0x7f0000000c00)=""/39, 0x27}], 0x4, &(0x7f0000000c80)=""/34, 0x22}, 0xfff}, {{&(0x7f0000000cc0)=@caif=@util, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000d40)=""/35, 0x23}, {&(0x7f0000000d80)=""/159, 0x9f}], 0x2}, 0xffffff01}], 0x4, 0x2000, &(0x7f0000000f80)={0x77359400}) setsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f0000000fc0)=0x7, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r5 = accept$alg(r4, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r5, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r6 = dup2(r5, r1) ioctl$KVM_SET_VAPIC_ADDR(r6, 0x4008ae93, &(0x7f0000000180)=0x5000) dup3(r3, r0, 0x80000) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r7, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) read$midi(r7, &(0x7f00000000c0)=""/3, 0x3) r8 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r8, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r9 = socket$inet6(0xa, 0x3, 0x6) r10 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r9, r10, &(0x7f0000000240)=0x202, 0x4000000000dc) ioctl$IMGETVERSION(r10, 0x80044942, &(0x7f0000000100)) recvmsg(r8, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 966.440012][T31879] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 966.526379][T31879] BPF: [ 966.536554][T31879] BPF:Invalid member name_offset:29696 [ 966.556729][T31879] BPF: [ 966.556729][T31879] 16:35:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 966.577967][T31879] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 966.614284][T31879] BPF: 16:35:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/cpuinfo\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) ioctl$SIOCAX25DELUID(r2, 0x89e2, &(0x7f0000000340)={0x3, @default, r3}) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 966.637316][T31879] BPF:Invalid member name_offset:29696 [ 966.679380][T31879] BPF: [ 966.679380][T31879] 16:35:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x7a00, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 966.926896][T31899] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 16:35:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 966.968413][T31899] BPF: [ 966.982134][T31899] BPF:Invalid member name_offset:31232 [ 967.003677][T31899] BPF: [ 967.003677][T31899] [ 967.048035][T31899] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 967.080101][T31899] BPF: [ 967.082973][T31899] BPF:Invalid member name_offset:31232 [ 967.095905][T31899] BPF: [ 967.095905][T31899] 16:35:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0xd100, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 967.469544][T31906] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 967.509157][T31906] BPF: [ 967.525406][T31906] BPF:Invalid member name_offset:53504 [ 967.552642][T31906] BPF: [ 967.552642][T31906] [ 967.593939][T31906] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 967.613594][T31906] BPF: [ 967.625902][T31906] BPF:Invalid member name_offset:53504 [ 967.638427][T31906] BPF: [ 967.638427][T31906] 16:35:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0xfffff, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:24 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000340)) getsockopt$inet_int(r0, 0x0, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000240)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVEDEF(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x38, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @dev={0xfe, 0x80, [], 0x1a}}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0xb}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x20004054}, 0x4000000) r5 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r5, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r2, 0x0, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha512\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 967.891247][T31920] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 967.923425][T31920] BPF: [ 967.926371][T31920] BPF:Invalid member name_offset:1048575 16:35:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$revoke(0x3, r2) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 968.014493][T31920] BPF: [ 968.014493][T31920] [ 968.066302][T31920] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 968.192530][T31920] BPF: [ 968.209265][T31920] BPF:Invalid member name_offset:1048575 [ 968.217706][T31920] BPF: [ 968.217706][T31920] 16:35:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900), 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0xffffff, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 968.609327][T31935] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 968.664217][T31935] BPF: [ 968.671933][T31935] BPF:Invalid member name_offset:16777215 [ 968.713454][T31935] BPF: [ 968.713454][T31935] [ 968.790516][T31935] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 968.839651][T31935] BPF: [ 968.842661][T31935] BPF:Invalid member name_offset:16777215 [ 968.879142][T31935] BPF: [ 968.879142][T31935] 16:35:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900), 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') recvfrom$rxrpc(r0, &(0x7f0000000000)=""/178, 0xb2, 0x100, &(0x7f00000000c0)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e23, @broadcast}}, 0x24) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 16:35:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'os2.', '\x00'}, &(0x7f0000000180)='aead\x00', 0x5, 0x2) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x1000000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 969.188392][T31952] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 16:35:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900), 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x400, 0xfffffffffffffffd, 0xc7, 0x1, 0x9, 0x3, 0x5, 0x240000000000}, &(0x7f0000000100)={0xaf23, 0x5, 0xffff, 0x0, 0x20, 0x5, 0x200, 0x6}, &(0x7f00000001c0)={0x9c9d, 0x5, 0x20, 0xff0000, 0x0, 0x7fffffff, 0x2, 0x4}, &(0x7f0000000240), &(0x7f00000002c0)={&(0x7f0000000280)={[0x4b]}, 0x8}) [ 969.239228][T31952] BPF: [ 969.242210][T31952] BPF:Invalid member name_offset:16777216 [ 969.259878][T31952] BPF: [ 969.259878][T31952] [ 969.292949][T31952] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 969.391719][T31952] BPF: [ 969.399122][T31952] BPF:Invalid member name_offset:16777216 [ 969.440557][T31952] BPF: [ 969.440557][T31952] 16:35:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900), 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x2000000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 969.738026][T31966] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 16:35:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) r3 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L+', 0x3ff}, 0x16, 0x2) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r2, 0x110, 0x5, &(0x7f00000000c0)=[0x2, 0x3], 0x2) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 969.801505][T31966] BPF: [ 969.818658][T31966] BPF:Invalid member name_offset:33554432 [ 969.847811][T31966] BPF: [ 969.847811][T31966] 16:35:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r3, r4, &(0x7f0000000240)=0x202, 0x4000000000dc) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r6 = accept$alg(r5, 0x0, 0x0) sendmmsg$alg(r6, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r6, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000100)={0x241d8445, &(0x7f00000000c0)=[r6, r7]}, 0x2) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) r8 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0)='batadv\x00') r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r10 = accept$alg(r9, 0x0, 0x0) sendmmsg$alg(r10, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r10, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) ftruncate(r10, 0x20) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="100026bd7000ffdbdf250e0000000500370000000000060028000000000005002e000100000008003b0002000000088cb66c0a85cc3213b599d4b6808b6f4b372162223836f6e9b8d8a2533e80482750d2be46d4b8ae7ae5dbf3c4d11b36bd0f38bfedde0a5b459f"], 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x40040) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 969.881546][T31966] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 16:35:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 969.939434][T31966] BPF: [ 969.942275][T31966] BPF:Invalid member name_offset:33554432 [ 969.998807][T31966] BPF: [ 969.998807][T31966] 16:35:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x3000000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) r3 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L+', 0x3ff}, 0x16, 0x2) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r2, 0x110, 0x5, &(0x7f00000000c0)=[0x2, 0x3], 0x2) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 970.328887][T31987] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 970.362719][T31987] BPF: [ 970.380120][T31987] BPF:Invalid member name_offset:50331648 [ 970.414863][T31987] BPF: [ 970.414863][T31987] 16:35:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 970.447024][T31987] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 970.479111][T31987] BPF: [ 970.481932][T31987] BPF:Invalid member name_offset:50331648 [ 970.487670][T31987] BPF: [ 970.487670][T31987] 16:35:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x4000000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) r3 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L+', 0x3ff}, 0x16, 0x2) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r2, 0x110, 0x5, &(0x7f00000000c0)=[0x2, 0x3], 0x2) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 970.896273][T32005] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 970.957674][T32005] BPF: [ 970.984083][T32005] BPF:Invalid member name_offset:67108864 [ 971.028787][T32005] BPF: [ 971.028787][T32005] 16:35:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 971.066871][T32005] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 971.099133][T32005] BPF: [ 971.101959][T32005] BPF:Invalid member name_offset:67108864 [ 971.107692][T32005] BPF: [ 971.107692][T32005] 16:35:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x5000000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 971.203178][ T27] audit: type=1400 audit(1581870927.385:115): avc: denied { bind } for pid=31972 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 971.420868][T32020] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 16:35:27 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r0, r1, &(0x7f0000000240)=0x202, 0x4000000000dc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000240)={0x0, 0xf9, "4fcf8f83e889554e166220ced3d51af05a88b4d0231fe49d4978b15076e33ecf7f5631a7ab5235924eda60e239a3e1417f5964493a193dcc29d1078e3319e5ca2d039d3fc3466ae5cebeac42ef4483ef2cd85c4e3317a363186397fa044ecddf567da01375b1846b41752a37a3d5a6092ccaa0e423a86ceeec6b57965d6a5975ac9db1643b97196f88d0363ff16a73ca131999f3d9ac045a22644ae2c2d23e1e8b9c933b3ff3ea97fab16faf4603f95e2aac9e77084bb2874e6c25ee5319e30293f4c0bb8fe869b60bfc38ac0cd35fbffd3faa56b1bf3fca10a8c3b35127e656e7f197facae5bd5e1d95e9dcf58abf7996f721301ad36d1da5"}, &(0x7f00000000c0)=0x101) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={r2, 0x6}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 971.485844][T32020] BPF: [ 971.489060][T32020] BPF:Invalid member name_offset:83886080 [ 971.540977][T32020] BPF: [ 971.540977][T32020] 16:35:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 971.575105][T32020] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 971.619142][T32020] BPF: 16:35:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) ioctl$int_out(r3, 0x5462, &(0x7f00000000c0)) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 971.669230][T32020] BPF:Invalid member name_offset:83886080 [ 971.692991][T32020] BPF: [ 971.692991][T32020] 16:35:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x6000000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 972.061029][T32038] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 972.112442][T32038] BPF: [ 972.139519][T32038] BPF:Invalid member name_offset:100663296 [ 972.189002][T32038] BPF: [ 972.189002][T32038] [ 972.239908][T32038] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 972.289551][T32038] BPF: [ 972.296060][T32038] BPF:Invalid member name_offset:100663296 [ 972.383747][T32038] BPF: [ 972.383747][T32038] 16:35:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x7000000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 972.632734][T32049] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 972.679567][T32049] BPF: [ 972.691547][T32049] BPF:Invalid member name_offset:117440512 [ 972.746066][T32049] BPF: [ 972.746066][T32049] [ 972.801485][T32049] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 972.880717][T32049] BPF: [ 972.897329][T32049] BPF:Invalid member name_offset:117440512 [ 972.929101][T32049] BPF: [ 972.929101][T32049] 16:35:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x8000000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x10000, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r5, 0x0, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r8}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000300)={'batadv0\x00', r8}) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r13, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010003b0dfff300"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r13, @ANYBLOB="140012000b000100627269646765000004000200"], 0x3c}}, 0x6000000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002700)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000002800)=0xe8) getpeername$packet(r0, &(0x7f00000041c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004200)=0x14) r16 = socket$inet6(0xa, 0x3, 0x6) r17 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r16, r17, &(0x7f0000000240)=0x202, 0x4000000000dc) getsockopt$inet_IP_XFRM_POLICY(r17, 0x0, 0x11, &(0x7f0000004280)={{{@in=@multicast1, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000004380)=0xe8) r19 = socket$inet6(0xa, 0x3, 0x6) r20 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r19, r20, &(0x7f0000000240)=0x202, 0x4000000000dc) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f00000043c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f00000044c0)=0xe8) r22 = socket$inet6(0xa, 0x3, 0x6) r23 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r22, r23, &(0x7f0000000240)=0x202, 0x4000000000dc) getsockopt$PNPIPE_IFINDEX(r23, 0x113, 0x2, &(0x7f0000004500)=0x0, &(0x7f0000004540)=0x4) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000004940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000004900)={&(0x7f0000004580)={0x378, r3, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [{{0x8, 0x1, r4}, {0xb0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r13}}}]}}, {{0x8, 0x1, r14}, {0x1e8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x100}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x3ff}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}]}}, {{0x8, 0x1, r21}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r24}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0xc, 0x4, [{0x8, 0x4, 0x83, 0x9}]}}}]}}]}, 0x378}}, 0x44000844) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 973.220366][T32067] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 973.289566][T32067] BPF: [ 973.303196][T32067] BPF:Invalid member name_offset:134217728 [ 973.341767][T32067] BPF: [ 973.341767][T32067] 16:35:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 973.379283][T32067] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 973.401835][T32067] BPF: [ 973.411445][T32067] BPF:Invalid member name_offset:134217728 [ 973.419449][T32070] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 973.432457][T32067] BPF: [ 973.432457][T32067] 16:35:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0xa000000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 973.698099][T32084] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 973.775871][T32084] BPF: [ 973.800024][T32084] BPF:Invalid member name_offset:167772160 [ 973.804109][T32074] bond1: (slave bridge1): making interface the new active one [ 973.833707][T32084] BPF: [ 973.833707][T32084] 16:35:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 973.863575][T32084] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 973.904619][T32074] bond1: (slave bridge1): Enslaving as an active interface with an up link [ 973.926542][T32084] BPF: [ 973.989076][T32084] BPF:Invalid member name_offset:167772160 [ 973.989086][T32084] BPF: [ 973.989086][T32084] 16:35:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x20000000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 974.194339][T32074] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 16:35:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvme-fabrics\x00', 0x482200, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(rfc7539esp(pcbc(aes-aesni),sm3-ce))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000100), 0x1, 0x0) [ 974.252226][T32097] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 974.265939][T32074] bond2 (uninitialized): Released all slaves [ 974.315268][T32097] BPF: [ 974.318226][T32097] BPF:Invalid member name_offset:536870912 [ 974.422662][T32097] BPF: [ 974.422662][T32097] 16:35:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 974.467454][T32097] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 974.489510][T32097] BPF: [ 974.493544][T32097] BPF:Invalid member name_offset:536870912 [ 974.514071][T32097] BPF: [ 974.514071][T32097] 16:35:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x841) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000005c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18}], 0x74}, {0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="475b3f077d03440e73d185bbeb3c68cb879e029446ea31efe6ef9c2b35b3e07a91d01ca56ebc"}, {&(0x7f0000000240)="016a9a34123bbe30e614bb792b568bf7467796ed08235c5d261bcb1ab8b6862eeb348a0cd71b43f5195c44a376e3a1da89f054b3fc0bff71bc6758275ac3835a1af0a48382abd1bbc44448069c4bba9ec9df9fef68d18c8a6ca15e33f532a878aba6d83ff44611b37527e0a7d85b6c20a26d24acbf50ad880d38b78f"}, {&(0x7f00000002c0)="4a702357f13508c6e4a4f84c903aa9bd120ae770545a00a8d7432aeebf02d7361bda6a7f188e9de1b936bf66d05d28a9a2ebd6e75a03f86db99884c52c2045f664139623bcc3aa6efa4d4c0ae4e6b2c5f07cb4d5088a7862daa29b2a8696b63958d07b909f4b806a068e7cd66ab7ba8f0935a9021445f6f3f8b6c873280871943a959154ef25c88a130be7fc5a1b884bb7b20120201beb3b504cdedef5fc13a4e7193cdd67a3dab1d1e34a5dd6648b6e93e72680deb809ef4506aab7"}, {&(0x7f0000000380)="73db800dd4480b0334cb7262cd7e295d9b0c58e175f15335c06ebe4bfe465b46e10dca3295947abea951b019121a9b1b2cc5acdf75669ff95f5d54ce7f30490ddc9c426de7a972401a3e02033f1120658153871764a195ba4202f3d91b12f6ac00bcf478edf932b1c374f5daa28c5312d931c077d0dba62fa8ad4cd7cab60ba40cfaf0c6d363482656ff26d37dcf8a56993b2f215241cd4490884010239c6d8be97032798dbf50fe0d4934f72e136a7498a9bec2e6ba02008e932976bd43ae1df0a6201f81d6df2c0236a6538d58c50672eb42691428a7"}, {&(0x7f0000000480)="06bfd172eda0ada21b4121fce95cef8f729eb0757a0a3e0aa9180a7104c9220d11eac8601a73ff3f19a311bd4784918d489af0a1b3c3be6278ac438829869504e818d0897422da9d76f315872d1165a68279c5299ce63e278461209eb7d71ccf6d7c34cad0224a17fa36ec4d82e3ee79ba9971f513eae7658d9721e3b572b2d6a55a2b9ad5a4bf9c432b9be64d667607473be0b75db04aca9b946855cbbf3b3016540e"}], 0x0, &(0x7f0000002480)=[@iv={0x0, 0x117, 0x2, 0x0, "98b6c421b8e31ed52d7fa21177c5ae67157293b3f6ae6438de62079446a10a5f86128749932835818ca05e452b9df457a2cde7c0f9d6517323b730eba18f73133eda7558e4bac55290461b6b57bfdc7d077984cf4de69abb6b7fad9ebb6b85816625d7d2158d7cf010a4b825b2902a56f049ac754c37912b9c25462cb4620f8639b856f26fd0b089e7547f1baa7c34e91bb757b33a7c4856bbc2f81348fd53f4cc9c6951b499a1ebe572eb12c0d98c9f971430736961b284616ec23d40ce576462c8c37969a9ff1aca5299563fb5313d7b14a5577129f423711b46cd86c6687362df2ce7ea3e253873d954f871b0187db81dee1c0dd5345245813bfd3fbe15fd3128e2147411eb4a286eaab3ebc136654eff56bd811538ec555dc8afee14081c4fbfe5d4cd34b16778ef836c15992822c327a7428c961b0f9c9e970b46e7916d449c0099846dcb2b16af0a42c4d34febe31a81a50092079c1c4651bf7852b0a2516bc2ab264d0c6e393b0a0338f69aa6d4a8f31c639ecd8d14ad11430f23c2a3e4af99ab82956c8959b090bac55d21d16df4bb568002fa26462a039c0b519c536af29684b571239be31387ff863340bd08f543fc8057a060bd57608bc063f5cdc094fd8d62f8d45035d6e9cc7b4b776f6ed4cd8d9b76baeae22b6d0c557ecfd44f385c2ae9ff718f1413cf098be93e14b6ea09b27dee263d09fd4d76d20e270b92404aff81b458ad186f1e213b6743771dcfe0ba30447e677ef33fccfd02bb6d519c8139acfacfd25e4b71b39653a19f3d33755886a4da0c9212c4272cb1dd54bda9740eb893dd57ef53fc4855118226d59a67c0d4b484203aaf6d06cd49abe8a2a73c39891e68341cbf58c98427bac615e41eb85a8a85ebd140cf51a5425621b95bf187449820592e72f23ce1037a6571cc709381d3098f408a9b314a387060ace24c9f1146558a6d62965b5ce8cea3cdefc2e36a502c8f1b90b2426b0bb4a7e3e0c75889fc47b005767d131ceabae5176c094ac4f42470767b039d2e8ad1b128c5c63c5e4b00a13f624717898a68eb8ca7eb97a731562c510d271707dfde0bb0203bbd4c1eda0cb0f40f0e505eadbf20c3b4b4613438b91cdaac5ef093cba63fe1484a63305e49ba184a7e822f403781f6f3f362a11e41eda418f879ffc7037f6a1a5f96acdc4de5e60a36d8452f9672acc582e3ece623d82b513b066b0eb44eb7afdbd1c0fead8ee46258c703aff9e7f865bd4fc20bbd92e46f46dd8c430985fbb8eced0bf1fdda54ade4eacd651949619e7e1d60a8bcf8c57d39237370bf017165f4014dff203e4bcd60049924537a2d884c3118e371d1bf210ead0c8a200f8f9ae83076bf65ca2594ea3906b2894fd6fc2af7578a5c5e16b98c36df8e9f95b1188be0307d7e200636c8fa505c3ea5e31c473f587247cc42fe536825ddd2de232ba108cacd3940d80cad4a489ce600f41cbc14ec7f98631080cf71452c6e531d5017ac35856e9005a628aa67033a7a0c6fe4c01d1b417427249ffc5104906fdd21ddf2d3303255bdaea4e2b8137dee881d984ebdeae54a335ddd440050c2d6bdac47363b9afe92f64d8da249e22c842f72e01f50287da0cdb0605b83710095693112b81f946a080498069a7f2b813cfa533f90c717840f9f7cd996c82223c3be705612fbb79810f40dd34aa699455969313aa8856d39cfac519baab082c6fbb767126b994cff312988a63567d39f042d48f473b66290a599763a2d8f276ce5415d41c317b1b8ce51539b8fb044006b05449a5feabfbe08bc3780006ab00821f1832d8d94e3e0a9629e5a3b37c9aac1a00695f23459e8caf21b78b9ffef7fc7c84ca6b95c9d840ee0239dba2c2a43db5c68150bd1a6fbea93a3d5b37c192bff4049cd2fc1be5aa3bb3ead29643d90375b74c80e480081407cd4b583c0c3c49d2a456ab629c99bda5a41ae3bf2bf70858b710d7b6ff5b7d93f553d206def220dcd79d5107e99e296ea4b32909cbaf2f7895c94b3d660810e20fc12056183abeb575aeaeb6d15fc6b1ad5551ec55e94d089405443f91e90c3612f143f585be8fd084503faa732fc1e3105199f59aa69be6175b6d47657dfe4a06f65327970589abd1a35ff65b33ce4537e610792a970ce83bf7ba16bd4a97d4c8a760e006f4671d1f945e75f0afe09d61c3c1a24be2b36aa3eb4467006b49fcb714b67c557d83a5c89370cb19a230d5fdc557e6b883e55c4f244fd43b8fb9bc86d5a7d49cbc0f4f3e84845884fc701205b9d250fbbbe0e1c878825a2088a9da10ea7d307371bb363fc7d92db82415a4c291ffd1fa6c4b8bae65a5635c12dab5b2ab3f36761138ed6a21d4300dd86bd7f6800a523a7692f7db13af22cbf0e09ba8a4883942c29d018664e67e309b53ebdc4deca18df713309efa8a7d652602fc8f71a556f8835517cd1768fdef8b18710eed25d2285df176fe964532225d3cace92619c105940d2f0732dd568e15fe37ca609e45efaad53eefdabfd17e9c3dc612c142a2ab66d2e3ed9d1765903e49e8b20d41da746c9b0a30ba2ca5599d9aa5b71c6ec9cebbae29dbcaa4e936f37dd2771a7b33a655c068250fcee6e4140bc84990ae5a5d86d7fb305b65baffb874cee63fc0ac24936c5388d48320446588339a15c08d617dcb0914a151c0982b2ed3bfc4ade9db1f9bbbaf8efb1ecc44d3376c5e21eec9f6e8c05609fb7f4bad00ecff8e4e01eab3c6ff7ebadefeafcc71a60551b7cbe4ea7aa784ae1fbb08662ca4868b4adc124648545e07597686549321372489e8edd7d9b7973a5d171712dbb7176330d15e00ec0c28a4de58595d1f1dd4e0f3f4d4492ac9145fae3ec04bbbe160022fd560251c92f84260436eaf07fe08fab6b6809e604add8e918131454ddb2b74bda88bf86f66e921dca94e9c746cea0602d789044d2f5a60549fd52b70baf74101f9606a91b57549121a57254d74d8da4202493ff1921b85061a1ab26933be6a19d8f16a6f03f2ea7212f5979d4d76571fd7a08bb07be7e75a73c02502e9f75bc81c7014d87ef46908522bd217d5e86640f3576eb5544f205a04c10d2ac10cb434ea72bf4327e495ee270f055987b29752dabdea030584031363eb1fde876fe7a2a377d5dc432017083043b2304d9f03cbbe5dcd8c781c2735019a9c0965b326f684552963782d3cadb939e1d88e5256a9b6e286fe463e0cd4ec30c525059ddf332e7b7730f5ecb3726a2fa0e76495e84b72a80d369307deb0a0eec29ad44be59c44ad93df0f35680bf6b74431dd5cd0cbb62be1002c8e522fbc24671d735a0fd82b258a7b4bb59fa276fd11c859d11102079d6d9998e852af9020556d07e5772021bd1e7ee17cdb5674b658887c04f10cc53fc45e5ca11a4002514f705f5ac82194343b85e126048cb4016adaba06661596c81e3eb44999523f55a9a49ee063a9f74917d6ea541e074e18ccc56461ab1e92715aba73735a50ddef83d43fb78343777e2a3d9bea073367d97353689d2075141142dee0e471d7906b6285e0023ced96dde9892c071745f1466dc365b3e515c07b3de9b97218bbe9663adec81ca058846ab9867d011cfb74a8a26b3a57459b1808f61ec5a3fc7e8ac04c557dffe0c45dc8e05184aa5155470571e3c1f8d5de8a1c775b6639928f130992fb59408da229c707ed38d15cba89194374e2544e04bc7450538f9b53ce72b2b903286c00e6723ca9f081db58a61e3f285366029c2da0c02d594c600e6c97ba0423a3f0b2a998bdaf3b478e7dc39eaec5bc5a555d9fba98715ad0518aa461df8215d20b086f75f169c3b3fd5ba3b954932e8d692275e3274ab9e26f5a3821f081f073ce8b74000cd06ebd6de56d56758cc14a96d75ae4032ea62573347b038cec5d5ab4654ce528f9b1d359ecc4036283487e56532044f5933dc85c611c06fe613ed029f8cf988fbe55de4f604fbafebfb2816f6f8b067e6dcf0a701470e6947729cb1209f902ede5394edcbc3cc24d0089e471bb9f122b45687dbbef62efd30ee7a6f8ff5a23a37fef78a2e75bb904d2115daffa3494b0b55e2b45a638eb4e3e5902b1977c7033b55630430dbdfe13aa1d9910a7839e7f634d08609bf984d0d9fcaf5baee0db44af2c9eb46bf523ebfbe18084bc78d579bddbb999be39f7f5bc49166a3d88c54513bd007003f1a173a7dbf6e30d1ffcd39af2bc169cebd40ec1ab03f4895422f1a62c26bdc5defe7a890df574db40b3c45b3d0fc7adf7ce95f5dc2c02c86b8f1f991fcc3a0ff88c6e67a663b0c9fc050367ae0b6cac1c29bd171228d1f04a796cdc7d91e653af34d3c3d5a07b388b30e33a31d928a04e2f3ec2ff7a14b2e6f930abf9a901a37c5a59e7efc6fb871e0a55ccc61db0b44c9824c2e09c116f427cfba4717f84f1e0a95da664ab8c1ecfc5519d3961915ec0b1e3d3aa3e0e087eaf5e37226f38312ad19db978a0584caf8576427b0a3cb1988e3a79180d79d5054c8ed0f7f759b5d2ff06c4abf5752a290d4290056631338f0eb6e745320e26e63fed66f6ad065437433b6aaead646ee9fd25989348644e76b45a86d04807d98f4ca6d41cde04bcab2afc5227ada0223a24405ae29c352a5d88f29e2cfeb82e63fe52ff92cb8d8b4ca69452502189a28304006a797156de61d80e7439a16c104fed7ec72b9b57106570bcdb948b5b47d371c416bedcfc1e75afb6c447a42bef38881141e7afbe95f6b3ac000d96416f96fa27d6d17ced8ca70936b732942c387c47041790200a84c7bf1b7d4136ef41a44800397ccde0a108ef1a9c768e945ba74f83b76b88c1d119bf71a66519ad991efd0d1d41a283b927cf58c7749aba415f9d6aaf8157b66973d58ec45d89c918f72081f74eb3d6bca5b5fdfe7b94e4cf4dcc8d3218b84d8cec83d0d834f52c32cb96f53b823c534f4f8581847d5034d0df1da27bd8e656123c9a5e782fe0ff8b67febfe3dc8d6a0e418c04e8f1834c80fd7ec37ce9a6f82a4e3974e41eb1bb30f3ddbc3eb93c79b7733262dd68ba6f0267c817bd7ae975488fe58fea7b2cbe8c1d13786183323842e4644267df9914bf7ad517f04d7ca2cb0ce028b4c9cc7f7ca30ce35e51bf5db6648cb9882c105ebcfeb68337a30b7ce6191570ed1af36e284d7faea2130cdc26ae74c63d96232739bb11147ddb53219fd5dcb2e03cf1c72f9c9a89c580942910005882711079cc84924f9906c65345f00381b7388e7021d85bb55a30cd421bf301a8a86f506ef91b85f2d50376d3b5c765f35c6299f7b3a494af69b693aa171e4ec0678b06430daae219de27aaba7d8e20dd3efa34c5ace45655602d760597eea077037685a9c5f4c7e6cfb7db36334cfd5850a0de76ad758e300ed8d32ada7738f520ca162cd89160d134a2dbcf80b0fabead017add19590f9d50bb05df37ec0cea6c502272f63dc8b3f7953f87fee37de0c66a157fbb4ed3cb200a8c729700440f8e55b381ead36af60c7619df3a9a5cf8ef09b9b5c2d1b0ff20fca8f9e9debe2799aa8e8703ae15bc46da4d6a2d31976b406ab8f17b0aab7f27d35ac771a73f9ca10a9468e10fb7bddc71654f2a1fc3bc68900761e9638eba166a83a3effd094a38e9dcbab89e1f5fccfa50c7c6e3b22d15e9a64fa09d53862c41d15774bea6809fd2f12e536af42866c53f657b20ddc066dc94a3dc1c97ff372fca2e73954d7994b384ef170c71b0f4f1753c7f1bc42f4b51004eb2cd2559de1e6bb1e2d8f2fb46cc45c335fb421b62178120b7b70b09dd55cf326fa438661cc6d"}, @iv={0x0, 0x117, 0x2, 0x0, "0467c332a61bfadf876a20939915bf174765b528c4121fe6e3c8897c412a986307f72d9b7fd5200a8bda73819a184ace549c8e3ad076eb2eeb12724b5a28396bddcbfc657b418b83a99c8acabe61e3269c43e1204d74d0310c19e2dca0c85bd11a5d9c32ff3cda0e5dfc36f755ffd828e9758517ac703e5841c9b0c2e20c2f59eac7d3494a0561ed81a01e1b975f089f9127a2753ed4ad3061dce01d0072cee6558885abc1cdd796bae7803f794f2e75a9b5970ccc4b84deff57dedf76968757b895031875661386e5c30f5fd73102e7716f4b22333a6c762b1cbe1b233913f80c46c9eabbff95a48bffa6d54f"}, @iv={0x0, 0x117, 0x2, 0x0, "8dc5f6dd0c3f977daaaabc205c1983f06877284d3a8ccdd41be068dc7815cbd3fad757667f00e94044dd6df8f4f394a91eb79d1e8361716c6550c30730a55f68398c023a82e9ad79ee8cc700b347c0bd5da6a9309d9eff013cff5ca00853344816c89c14124cd61b7c7fa73a27b1e0a3f44309e4477dd8adbd4c9236d520b792af26c43d89fbf0c84a10fcdfbe7e6fdd69e25ae04f"}, @iv={0x0, 0x117, 0x2, 0x0, "07a1901160d5b5d52878b76fe4a6327dfc74b0e9aa35fcf4810ac24b5dae0f8f8c254985f4a246e85d0a8e313ad87e824dad65b5ebf16aa16e74c540535a5c7f5adc1ff533683784927e1e038e93fc4b72862ab8991531d27c15fee9eddec44e6c27ec6428a0a74e1adea5644eb6096bddedc3c3ea"}, @iv={0x0, 0x117, 0x2, 0x0, "fd"}, @iv={0x0, 0x117, 0x2, 0x0, "f0f17546bf30161017b3cc91cc6fe4f298784d97530e52657e5f4e1faa942390b57070b05c"}, @iv={0x0, 0x117, 0x2, 0x0, "4cbce450ec136dad236e8d44c20332a9c34ed2ee98edf8c697b648619aa4ae3f12bfc3306efa7c0623c39843879dcbca93f94038b0d9fa42300d2c5e869c124150e7c82809aa6ccdf66763bb7547c9d4616d84be8adcc24313a9057ca2be9197f7084cc37af71d2b573af90a877aedeb3a994193a025dd33b0702adc1a873e6e4a8e5b99"}]}], 0x1, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x8ed00, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x24000000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 975.065299][T32121] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 975.136738][T32121] BPF: [ 975.152815][T32121] BPF:Invalid member name_offset:603979776 16:35:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 975.188312][T32121] BPF: [ 975.188312][T32121] 16:35:31 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r0, 0xc01064bd, &(0x7f00000000c0)={&(0x7f0000000000)="6aae6661c117dc82d270c290f62762bc8cdae83a2dbed1c16614899bf2dedd9188b1dc57da5a991c700fcc766e8bbd3f0339211516a2b9fb70e041822bb3475c56e9a89ff69e4d7f75d5b4430544d55cf8ab3ba652a8d12076daae93ce4bb11ace5cb86ee87f534d5611d322fe60f169554f1d00349d169a74373ee250f2469ed8b5", 0x82, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(r1, 0xc00464be, &(0x7f0000000100)={r2}) preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) 16:35:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f00000000c0)={0x3a, 0xb, 0x4, 0x17, 0x7, 0x100, 0x0, 0xf5}) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 975.218272][T32121] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 16:35:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 975.311445][T32121] BPF: [ 975.315430][T32121] BPF:Invalid member name_offset:603979776 [ 975.348376][T32121] BPF: [ 975.348376][T32121] 16:35:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x30000000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 975.698747][T32145] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 975.716351][T32145] BPF: [ 975.727421][T32145] BPF:Invalid member name_offset:805306368 [ 975.743878][T32145] BPF: [ 975.743878][T32145] 16:35:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 975.772126][T32145] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 975.811903][T32145] BPF: [ 975.818333][T32145] BPF:Invalid member name_offset:805306368 [ 975.837851][T32145] BPF: [ 975.837851][T32145] 16:35:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000040)={0x0, 0xf, 0x8, 0x5972, 0x13, 0x8, &(0x7f0000000000)="e468f6cae66a7b1efa8fb106f6518329c4d901"}) 16:35:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x32000000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 976.227007][T32159] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 976.273460][T32159] BPF: [ 976.282137][T32159] BPF:Invalid member name_offset:838860800 [ 976.301930][T32159] BPF: [ 976.301930][T32159] 16:35:32 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video1\x00', 0x2, 0x0) splice(r1, &(0x7f0000001440)=0x9, r0, &(0x7f0000002480)=0x3, 0x7, 0x7) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r4, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'tunl0\x00', 0x1}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r5, r6, &(0x7f0000000240)=0x202, 0x4000000000dc) ioctl$KDSKBMETA(r6, 0x4b63, &(0x7f0000000000)=0x4) 16:35:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 976.333643][T32159] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 976.385227][T32159] BPF: [ 976.388265][T32159] BPF:Invalid member name_offset:838860800 [ 976.433576][T32159] BPF: [ 976.433576][T32159] 16:35:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x48000000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 976.737512][T32178] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 976.814683][T32178] BPF: [ 976.817660][T32178] BPF:Invalid member name_offset:1207959552 [ 976.863529][T32178] BPF: [ 976.863529][T32178] [ 976.882130][T32178] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 976.907418][T32178] BPF: 16:35:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000000240)=""/157, 0x9d}, {&(0x7f00000000c0)=""/99, 0x63}], 0x3, 0x0, 0x0, 0xe7030007}, 0x3) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 976.925150][T32178] BPF:Invalid member name_offset:1207959552 [ 976.956011][T32178] BPF: [ 976.956011][T32178] 16:35:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x0) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x8, 0x6, 0x201, 0x0, 0x0, {0x3, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x1040) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) 16:35:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x4c000000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 977.323630][T32195] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 977.400650][T32195] BPF: [ 977.422462][T32195] BPF:Invalid member name_offset:1275068416 [ 977.453704][T32195] BPF: [ 977.453704][T32195] 16:35:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 977.478036][T32195] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 977.506600][T32195] BPF: 16:35:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 977.525277][T32195] BPF:Invalid member name_offset:1275068416 [ 977.564742][T32195] BPF: [ 977.564742][T32195] 16:35:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x60000000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}, 0x128}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 16:35:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r3, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000240)="210958e19f2c2fbb140ff0d25b31fc4474bb41b21dabcab5cd0b22dab20dd25d4190a84f63aefd406e3328ff3040bc2833b9e793beb51da178437df343df29826b5b6f4726d4257f5b10a1b2659716129393dd224d6b5c6858a444f07fcdd1814c0e8ca70873c036756a4e6295d0f8414f14c1654dc039a863104fc6", 0x7c) setsockopt$CAN_RAW_ERR_FILTER(r2, 0x65, 0x2, &(0x7f00000000c0), 0x4) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = syz_open_dev$vcsu(&(0x7f0000000100)='/dev/vcsu#\x00', 0xc1, 0x10000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r2) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0xc0102, 0x0) [ 977.913165][T32210] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 977.943746][T32210] BPF: [ 977.962810][T32210] BPF:Invalid member name_offset:1610612736 [ 977.999114][T32210] BPF: [ 977.999114][T32210] 16:35:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 978.040111][T32210] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 978.083964][T32210] BPF: [ 978.087277][T32210] BPF:Invalid member name_offset:1610612736 [ 978.158261][T32210] BPF: [ 978.158261][T32210] 16:35:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x68000000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 978.424619][T32228] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 16:35:34 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r0, r1, &(0x7f0000000240)=0x202, 0x4000000000dc) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0xdd, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}, 0x24010}, 0x0, 0x4, r1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) [ 978.494984][T32228] BPF: [ 978.498088][T32228] BPF:Invalid member name_offset:1744830464 [ 978.559106][T32228] BPF: [ 978.559106][T32228] 16:35:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xe7030007}, 0x40002100) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000240)={0x1, 0x0, {0x1, 0x3, 0x1, 0x20}}) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) write$P9_RREMOVE(r3, &(0x7f0000000280)={0x7, 0x7b, 0x1}, 0x7) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r4, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') acct(&(0x7f0000000540)='./file0\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[@ANYBLOB="8a974cf14753d2b57100836d1ec68af7ab57041b45bf825790a4c7243f9739d7", @ANYRES16=r5, @ANYBLOB="107000fddbdf25020000000800020002000000440004800500030001000000050003000200000005000300050000000500030005000000050003000600000005000300060000000500030002000000050003000600000008000200"], 0x3}, 0x1, 0x0, 0x0, 0x4000000}, 0x4001) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x1ac, r5, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x198, 0x8, 0x0, 0x1, [{0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x526b14d3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x64}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1ae81d65}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x30ee06f9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x628f6279}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xde}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x76c53772}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x47f8994}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1be92161}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x23}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5a}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3cf6afe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x65d3cead}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9c}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x49}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x20260720}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x41695404}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x12}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2b5cc8df}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x32e9ea60}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1583ed7b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1506fb1c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x47}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4f3cf392}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xef}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xac}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe3}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x50}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2fc0b44c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3e580b15}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x367393ef}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x424614b6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9c}]}]}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x4000800}, 0x4842) ioctl$DRM_IOCTL_MODE_GETCRTC(r2, 0xc06864a1, &(0x7f0000000640)={&(0x7f0000000600)=[0xa449, 0x10001, 0x4], 0x3, 0x10001, 0x55c, 0x5, 0xc000, 0x8, 0x8b, {0x10001, 0x9, 0xffc1, 0xff, 0x101, 0x0, 0x5, 0x1000, 0x7, 0x8, 0x4, 0x8, 0x101, 0x200, "c519dad2854dd8926e9ed42dca75db2753d9d91de774180e2fdc427d2342d8b1"}}) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 978.601145][T32228] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 978.662047][T32228] BPF: [ 978.695086][T32228] BPF:Invalid member name_offset:1744830464 [ 978.740070][T32228] BPF: [ 978.740070][T32228] 16:35:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x6c000000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0xc095}], 0x1, 0x20040000) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x400000, 0x0) socket$packet(0x11, 0x2, 0x300) accept4$alg(r2, 0x0, 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, 0x0, 0x0) alarm(0x5) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x2) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDCTL_DSP_NONBLOCK(0xffffffffffffffff, 0x500e, 0x0) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x20, 0x10040) [ 979.101558][T32246] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 979.149948][T32246] BPF: [ 979.153309][T32246] BPF:Invalid member name_offset:1811939328 [ 979.222317][T32246] BPF: [ 979.222317][T32246] 16:35:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/782], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000000)=0x7fff) [ 979.270932][T32246] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 16:35:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0x1, 0x0) ioctl$VIDIOC_G_FREQUENCY(r2, 0xc02c5638, &(0x7f0000000100)={0x9d555d41, 0x0, 0x2}) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 979.338154][T32246] BPF: [ 979.357727][T32246] BPF:Invalid member name_offset:1811939328 [ 979.404479][T32246] BPF: [ 979.404479][T32246] 16:35:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:35 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x74000000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 979.934321][T32274] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 980.003415][T32274] BPF: 16:35:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:36 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 980.028420][T32274] BPF:Invalid member name_offset:1946157056 [ 980.067247][T32274] BPF: [ 980.067247][T32274] [ 980.108294][T32274] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 980.199123][T32274] BPF: [ 980.209368][T32274] BPF:Invalid member name_offset:1946157056 [ 980.244488][T32274] BPF: [ 980.244488][T32274] 16:35:36 executing program 1: pipe(&(0x7f0000000480)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socket$inet_smc(0x2b, 0x1, 0x0) sendfile(r1, r2, 0x0, 0xa808) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe7a, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x9}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52", 0xc) r4 = socket$kcm(0xa, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x890c, &(0x7f0000000000)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r5 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r5, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(r0, 0x0, 0x0, 0x80000) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x20041, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x200}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f0000000240)={r7, 0x1, 0x30}, &(0x7f0000000280)=0xc) recvmsg(0xffffffffffffffff, 0x0, 0x0) clone(0x2100480, &(0x7f00000002c0)="4d070a2e725806e7ddf07d718a256921ece2c0d24dbdd5835eebcf9e959dc8c1823269da9973b99c2128b0807a87bd3ba29efdc984d0191ac0c6f81da457070f396648f775026a420fb7e141a307e3d61accd5e925f24d86360262", &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="d22219168c4996f45c62e430b71be42a420d9a33c55dc7702ed49748613e106b") 16:35:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x7a000000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 980.560091][T32291] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 980.600272][T32291] BPF: [ 980.613361][T32291] BPF:Invalid member name_offset:2046820352 [ 980.640970][T32291] BPF: [ 980.640970][T32291] 16:35:36 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:36 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000240)=0x8) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 980.667566][T32291] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 980.717638][T32291] BPF: [ 980.735595][T32291] BPF:Invalid member name_offset:2046820352 [ 980.768741][T32291] BPF: [ 980.768741][T32291] 16:35:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') fremovexattr(r1, &(0x7f0000000000)=@random={'trusted.', 'net/nf_conntrack_expect\x00'}) preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) 16:35:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0xd1000000, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 981.088737][T32311] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 981.119401][T32311] BPF: [ 981.122226][T32311] BPF:Invalid member name_offset:3506438144 [ 981.128150][T32311] BPF: [ 981.128150][T32311] [ 981.295225][T32311] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 981.350062][T32311] BPF: [ 981.362041][T32311] BPF:Invalid member name_offset:3506438144 16:35:37 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 981.403337][T32311] BPF: [ 981.403337][T32311] 16:35:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0xffff0f00, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, @perf_config_ext={0x0, 0x400}, 0x6af3f786760f1831, 0xac, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) [ 981.733346][T32332] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 981.748636][T32332] BPF: [ 981.767121][T32332] BPF:Invalid member name_offset:4294905600 [ 981.783639][T32332] BPF: [ 981.783639][T32332] 16:35:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 981.856378][T32332] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 981.886945][T32332] BPF: 16:35:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = socket$inet6(0xa, 0x3, 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e23, 0x7, @rand_addr="bce67e2330446dd8990761a60e67b8ab", 0x1}}, [0x5, 0x9, 0x5, 0x8000, 0x40, 0xfff, 0xffff, 0x3, 0x87cd, 0x7f, 0x2, 0x7, 0x6, 0x80, 0xff]}, &(0x7f00000000c0)=0x100) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r3, 0x20, 0xca7e, 0x0, 0x6, 0x4}, 0x14) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r4 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 981.919151][T32332] BPF:Invalid member name_offset:4294905600 [ 981.952748][T32332] BPF: [ 981.952748][T32332] 16:35:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0xffffff00, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 982.188105][T32350] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 982.253640][T32350] BPF: [ 982.273798][T32350] BPF:Invalid member name_offset:4294967040 [ 982.299693][T32350] BPF: [ 982.299693][T32350] [ 982.307261][T32350] BPF: (invalid-name-offset) type_id=2 bitfield_size=0 bits_offset=0 [ 982.339256][T32350] BPF: [ 982.357840][T32350] BPF:Invalid member name_offset:4294967040 [ 982.406016][T32350] BPF: [ 982.406016][T32350] 16:35:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000011c0)=[{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="652a457b0e235bf36d654d4b839eab1bff3dc297c9d1b1f8b4763ba82ed2349dd8e8fedeeac666d6efa4183443ddc1ebd1c8b5d56a0219466d33300507019853f8244de826dd180a72f54b07fc4f9ad7d9ab4d3c725081fb439544416288ebd88e7270ca2a595e30f4664ac2dc9b2130d9f15fdb2b79d2113d8bfd8aa8041ab5003719174808f097176fb2648c5568627e5aab4e7d87741824b8103dbc16cbafecf58799588affb830c068847ddc78f3ee7b2633b6d64658a4e7a821ff1c9ffb9d0a74b287967eb22275b3e43e15c3adf3a6f4d6fd3f63e2ae6e", 0xda}, {&(0x7f0000000340)="9e6c06d57ee9c9fed4ccece6d9abd0016f04bc5755c1e884d674eba60c755f15e317f671644dab12bebbc57d3c36c74b3e0eaa0db805fb75834f7114299bddf8c8799eeee7fcedbf9a67698a2905371b0dec4b7790800d8eaabfedb98206aa09075aa2d56a471022710c47b8c63a17e2f87f0ade1d8e6ed5099dea5830cacf66e81e396d76740fbea4ba5b", 0x8b}, {&(0x7f00000000c0)="e1638b386c531530ac6cc85627b5c4806583a3943fd530f96e1491c1ca863ff63f9a60e65b59081bf03215ded9bd0abc399a8fb7535cd599cc209fa08ba56d4f05991efafc6607d9b2dc6625327e8d", 0x4f}, {&(0x7f0000000400)="5174c0552c8c91f870501b266f3d90de9891bd9aab9b7009494894c4aa118b69949f5551d6b8448a1a0045f6e766020f2c54de10ad55ee351842cd0830f0fdcafd4f4c16f57bfb8d9a0a7eb358de1e0e281a5fad977fef8b3b06bcfbf044df73ab8f40abda46fe69aa5d98094aff8395474fea2eec3f0b02ae954c6ac47c9173c8da20506b8c68c73a054a27adcde384497fd1a7a2d8716445d14148a25957620dd2e43424999c9230fc0a50a57c4e6e1103", 0xb2}], 0x4, &(0x7f0000002480)=[@iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @op={0x18, 0x117, 0x3, 0x1}], 0x1030, 0x1}, {0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000004c0)="d9947f59f6d1d560f7f992ebf9d8b499791cc7106b76134451bb395d0df6874fc1aaa92ca01441f292b1f8694eca14e8391195fde48d2dbb0eb2d2998c929848977da8396208cf4585e5261e2becaf7706f7e26cf4dd7f994055ae", 0x5b}, {&(0x7f0000000540)="480e3c5207d294acf4fde9af160409f1dfb2f157475c8da0a59942e184c88b6c6aed046eb67c577fe548921520013e47ad9bdd862224965a53ceca02678d23699fd19bc5e5f511d541e8b908db8d7a8028eb88f1", 0x54}, {&(0x7f00000005c0)="0925c95a2779097fd0a26ac30fcc1f883f3da1538dfed9d772b6105823ba3e23b5eab913245e1bb9fcb8d191943208b1e868d5fc9ee145860d7fe015cf99cab13edc29fd7682b5c393580d6f0778bf364d32112cf0946204fb0b8eee3c1d2072d8af8860cf1628704bad1d41ca7e1c9f1f95afd0c77faa0e08f47b90ca1f7da59bfabe86e78f2e2a2d7f687c29e7dc725f2c2a19ffaec0eb7a70eb2725be51901800d14fa9f924d8065aa3ab76ceec1a4aa520bf4cb0a797d3b4d4f625e4e1d51f3d8d13cc960af6", 0xc8}, {&(0x7f00000006c0)="8be473d56788d8ca90e2e526ae1421e0f435ea901139135dcad0238cbbf5d9cb84a2aa4bea8cbd0318b4526c3bea8a7bd3d3ae2dacbd863f14bb8dbc94c3ffb060583afa678ac6ac06620adc9a542d996ec8c7516004d3392fca5dfc6bc0341857a50b28eb7d762d5360d95ae75e8b8a90644309f50c3a2beb72971baf35079b7dab63dbc53c1a483d5823f5a7d9334731a74e34f574767e0bc7a9c34437e0b2b115518b3c993a4bfa55863872435c1e39d4fe6794048188f0efdcfb7f34128e718cf879d52456209e4632de6e8d31bbdc2d553097f0f86fcb21b3dedc9ad54a80a67fb5236678f7cb", 0xe9}, {&(0x7f00000007c0)="fd8da0d4bf738739632e8ef7dbf9a9be9d1e23757f9f5284f61612d03e0c36e4d40afbbdfa20e157639443e77d637c72b8475db95e9d6f4d99e07e9842f0ef4f796b6ce0c2660e9e296a25fd58c7168ec084f8c6cedaa542d9a0bb70ee2ac097ad7376f007a7b5c79b0d23098d8a2b96480441320824451fd1464c664f4fcb9b43195b129e79caa2823e4c412fbbedfcc38630274f755955df36f5f433c700129bd721908df9b32ce5ea05746fb762a3c64a44f657fdc6d7733216c90c0aa18036fa4838d56b54744027534d7058703f342b15edb36cdcaf4ffcd97e27d2356309ff15285d0b57aab8b14e539620fcf671c79a", 0xf3}, {&(0x7f00000034c0)="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", 0x1000}], 0x6, 0x0, 0x0, 0x40}, {0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000940)}, {&(0x7f0000000980)="cfc377079ace426f92e7737d51dd39253f0a23aa1eac1a50fc87232c521cecb66a0ac01b154d1ea82a8d43494707742eb170cfc909d539f6e889e6ba9077343dc760", 0x42}, {&(0x7f0000000a00)="b7fba02d993d8211b31159e3cf1eac659ba523c8ffc4379ed1b0814f0512300c8116151c98af0fbf06a02b11eb3148ce65462d6335081c8de1c51d9c22dc56584e07c8647a84393eb890a9770ffd", 0x4e}], 0x3, &(0x7f0000000ac0)=[@iv={0x68, 0x117, 0x2, 0x4d, "331b9f3e2d589a34cbdb2548983580027dc3a48fabf744ba5328663303ea3b9eb912e157e3f1fa7494ea178f990737ca31469c9784cac448b53fe0dcdf7af1303ded8234112814674d3defa6be"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x7fff}, @assoc={0x18, 0x117, 0x4, 0x5}, @assoc={0x18, 0x117, 0x4, 0x5}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0xf8, 0x4000001}, {0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000bc0)="d59b11304e66407eca1c8c11d7ca75be668d3b125204a73f3c67fef8022a12f420064b74f66e8ef076edf204dffc3c6aaaee8ca4e7c0c88915d89d7ff1cb93529368de0f581a3e257b73b36d0ca8e8c4071d4a275f71704f6e2d88e69eb5647c78f92d3b65eaf554a70ac4ba063c4a6a5f46024341f9554a61ada4b62c6940f82043f5c692fdc8f32d85de208ae08787c939823a9e9fe1d2bd5f137c476d2cec013aec9d7f991074081ec37cfa69bfc69e002f18ae725043245033c6d0ef7397b899f064d00a6ccfc6413701061ed39a87755c051875a22380800fdb1803a575c55f7051", 0xe4}, {&(0x7f0000000cc0)="c2f1207189849c9e935eb7f8a34c785c7b59d2c5ac18c43b953fdbffb97e562e6c9e7a0673f7227c3c71805bc8ed933eae2e7ef3bd5c75e3915c7ad06b12648acc", 0x41}, {&(0x7f0000000d40)="1aff6c7f622b45521f68bdb2a6642c3d94a435549df5af30587ae72287cce59b14868c9ad5c22650518caaf8774bbb7ed7182a55031403a46e54b18e5c05d9374902b4038224a2877184adf16a83587b94840f11836047cfe9fed2708a88280dc3d97b203c994ddc3249a3b0da4c1154fcccf07b2cab923947713d7092540d6426ad54ee43021ed29cad3f9fb0a01a0af4c5c9cf06f3013537343b541560c172101c283e7a601d14749e0fc2fc793e503487e189f21dd5a978a557a2fbbdb44cea00619cdbf5c8dc34f544383907ac7399f0b8a089cefd700a85a35c4e", 0xdd}], 0x3, 0x0, 0x0, 0x4000000}, {0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000e80)="5616daf931e6304653d401f62da1bd484b21a566c295cb31ad0233729a9f67c20f44c76fb8263f6a1964765600c45064372cf7d8b18364fec4571d41fa598e04b20864f9caa1", 0x46}, {&(0x7f0000000f00)="35717070d4569eb8cd29c294d7cc55a18ee9bb905015f772fbf1cac304d13a7314a8", 0x22}, {&(0x7f0000000f40)="167ddf139e6758755d5a91c07abc71ececb6a9c65b866225a7ff8f6ccdb4a4785d344d87c92c4eff7f60a4b5b4824af5b998b8e18cdebfdcf303dc11d0673d2f593886a39447ba64d411300f332e4cf64577318a86b5c205789e7a5d215ebe55e3a6726702ef81575fdb140e69532ca0", 0x70}, {&(0x7f0000000fc0)="862a5f5ad13193572d4d9e15e2655bcd05b94158ca296e", 0x17}], 0x4, 0x0, 0x0, 0x4c010}, {0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001040)="a13a68e83664276e896b8aa6d6beed4526e7d271e4355378f9d10af11c4f5107b99029afc307b8f8d40df8689ddd93a851aa762f7cc3ffec5c1cfa130d5be1740374d115b27b9f72e2f0cc9c4432f67b5741889528ca851f453661bc275cfdc838eea11fd1a6f276d468dc8f7f3b91b90294950a018fe55d706ba244669ecb4e286bfe392e8c294190dbf4caeade45ff14e7cdd7978bf9b8c986ef630d4a463e92b7f725f5b8df94f509c4a0dee6770e179f35f95821429293761cdf434aa2140fddd0c851199b99baac9a872d4922414e01d6542ccb903b14e665e7808488187e6cbff7dfe7", 0xe6}], 0x1, &(0x7f0000001180)=[@op={0x18}], 0x18, 0x8010}], 0x6, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x3}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 982.861809][T32363] BPF:[3] STRUCT (anon) 16:35:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1d}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 16:35:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 982.890854][T32363] BPF:size=0 vlen=1 16:35:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 982.915704][T32363] BPF: [ 982.918682][T32363] BPF:Loop detected [ 982.969153][T32363] BPF: [ 982.969153][T32363] 16:35:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_REWIND(0xffffffffffffffff, 0x40084146, &(0x7f00000000c0)=0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 983.006368][T32363] BPF:[3] STRUCT (anon) [ 983.036674][T32363] BPF:size=0 vlen=1 [ 983.059410][T32363] BPF: [ 983.062328][T32363] BPF:Loop detected [ 983.118581][T32363] BPF: [ 983.118581][T32363] 16:35:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x9}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 983.434267][T32381] BPF: (anon) type_id=9 bitfield_size=0 bits_offset=0 [ 983.482816][T32381] BPF: [ 983.492757][T32381] BPF:Invalid member [ 983.512554][T32381] BPF: [ 983.512554][T32381] [ 983.540379][T32381] BPF: (anon) type_id=9 bitfield_size=0 bits_offset=0 [ 983.578682][T32381] BPF: [ 983.593892][T32381] BPF:Invalid member [ 983.610888][T32381] BPF: [ 983.610888][T32381] 16:35:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$bt_rfcomm(0x1f, 0x1, 0x3) recvmmsg(r2, &(0x7f00000005c0)=[{{0x0, 0x0, &(0x7f0000002e00)}, 0x6}, {{&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000640)=""/104, 0x68}, {&(0x7f00000006c0)=""/64, 0x40}], 0x2, &(0x7f0000000580)=""/7, 0x7}, 0x1f}], 0x2, 0x18000, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') preadv(r3, &(0x7f00000017c0), 0x1d0, 0x0) 16:35:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x1d}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 983.935917][T32393] BPF: (anon) type_id=29 bitfield_size=0 bits_offset=0 [ 983.957793][T32393] BPF: [ 983.969247][T32393] BPF:Invalid member [ 984.006028][T32393] BPF: [ 984.006028][T32393] [ 984.075117][T32393] BPF: (anon) type_id=29 bitfield_size=0 bits_offset=0 [ 984.137455][T32393] BPF: [ 984.167782][T32393] BPF:Invalid member 16:35:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x40001, 0x0) getsockopt$packet_int(r2, 0x107, 0xe, &(0x7f0000000100), &(0x7f0000000240)=0x4) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000280)=0x2) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 984.197387][T32393] BPF: [ 984.197387][T32393] 16:35:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x34}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 984.573480][T32413] BPF: (anon) type_id=52 bitfield_size=0 bits_offset=0 16:35:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 984.626639][T32413] BPF: [ 984.646824][T32413] BPF:Invalid member [ 984.669380][T32413] BPF: [ 984.669380][T32413] [ 984.713763][T32413] BPF: (anon) type_id=52 bitfield_size=0 bits_offset=0 [ 984.766052][T32413] BPF: [ 984.787899][T32413] BPF:Invalid member [ 984.817048][T32413] BPF: [ 984.817048][T32413] 16:35:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x36}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) recvmmsg(r1, &(0x7f0000001b00)=[{{&(0x7f0000000000)=@isdn, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)=""/244, 0xf4}, {&(0x7f0000000200)=""/148, 0x94}], 0x2, &(0x7f00000002c0)=""/11, 0xb}, 0x200}, {{&(0x7f0000000300)=@pppol2tpv3, 0x80, &(0x7f0000000540)=[{&(0x7f0000000480)=""/184, 0xb8}, {&(0x7f0000000380)=""/16, 0x10}], 0x2, &(0x7f0000000580)=""/204, 0xcc}, 0xfffffff8}, {{&(0x7f0000000680)=@ipx, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000001a80)=""/108, 0x6c}, 0x6}], 0x3, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) 16:35:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 985.143247][T32428] BPF: (anon) type_id=54 bitfield_size=0 bits_offset=0 [ 985.212808][T32428] BPF: [ 985.215907][T32428] BPF:Invalid member 16:35:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 985.254826][T32428] BPF: [ 985.254826][T32428] [ 985.302758][T32428] BPF: (anon) type_id=54 bitfield_size=0 bits_offset=0 [ 985.339407][T32428] BPF: 16:35:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x3f, 0x400100) write$P9_RWSTAT(r2, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 985.349390][T32428] BPF:Invalid member [ 985.358603][T32428] BPF: [ 985.358603][T32428] 16:35:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x4b}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 985.721593][T32444] BPF: (anon) type_id=75 bitfield_size=0 bits_offset=0 [ 985.791603][T32444] BPF: [ 985.811289][T32444] BPF:Invalid member [ 985.835892][T32444] BPF: [ 985.835892][T32444] [ 985.875743][T32444] BPF: (anon) type_id=75 bitfield_size=0 bits_offset=0 [ 985.925425][T32444] BPF: [ 985.950135][T32444] BPF:Invalid member 16:35:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 985.970868][T32444] BPF: [ 985.970868][T32444] 16:35:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x63}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r1, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000480)={{0x10b, 0x7f, 0x80, 0xeb, 0x1cd, 0x6, 0x33, 0xc0a3}, "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", [[]]}, 0x21f) 16:35:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 986.318017][T32459] BPF: (anon) type_id=99 bitfield_size=0 bits_offset=0 [ 986.359176][T32459] BPF: [ 986.361992][T32459] BPF:Invalid member [ 986.365901][T32459] BPF: [ 986.365901][T32459] 16:35:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(r1, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff6000/0x8000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240)="97e8239dfe5160a5d56c90f3bf0b91d781e213d6d8b14f5244ae67537efc7418a7264de0db9053c71cb1fd1489b5be98fb716ccafe6027b7825bb42b290cabd056ebafcdafdb42b8c6dff383098d816919e4088c953e6beff62afd948707e36edb230b2a6dba9b4feaeec272788e7aff0194f8b2c66620e441dcda178b7d0df76f3f254ddb0999b83d19d2c741edd86a0b532ff76d77912aa08c9038fd11c0157271de2b4343cfd9f83f041b38dbe2b1ba9bda94f7b6d9f92d2848e3cbe858d869b166171ef36f852fd42ec12654", 0xce, r3}, 0x68) [ 986.491279][T32459] BPF: (anon) type_id=99 bitfield_size=0 bits_offset=0 16:35:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 986.535342][T32459] BPF: [ 986.548855][T32459] BPF:Invalid member [ 986.565628][T32459] BPF: [ 986.565628][T32459] 16:35:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 986.925396][T32478] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 986.973437][T32478] BPF: [ 986.988103][T32478] BPF:Member exceeds struct_size [ 987.016258][T32478] BPF: [ 987.016258][T32478] 16:35:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 987.049992][T32478] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 987.085046][T32478] BPF: [ 987.088140][T32478] BPF:Member exceeds struct_size [ 987.139120][T32478] BPF: [ 987.139120][T32478] 16:35:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x118200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000200)={{0x8, 0x6, 0x5e53}, 0x4, 0x2, 0x2, 0x0, 0x4, 0x6, 'syz0\x00', &(0x7f0000000040)=['net/nf_conntrack_expect\x00', 'net/nf_conntrack_expect\x00', 'net/nf_conntrack_expect\x00', 'L\x00'], 0x4a, [], [0x6, 0x5, 0xd596, 0x4]}) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) 16:35:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 987.487512][T32493] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=2 [ 987.545391][T32493] BPF: [ 987.548433][T32493] BPF:Member bits_offset exceeds its struct size [ 987.592602][T32493] BPF: [ 987.592602][T32493] [ 987.643153][T32493] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=2 [ 987.677685][T32493] BPF: [ 987.686101][T32493] BPF:Member bits_offset exceeds its struct size 16:35:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 987.710920][T32493] BPF: [ 987.710920][T32493] 16:35:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x3}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:44 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r0, r1, &(0x7f0000000240)=0x202, 0x4000000000dc) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x2934, 0x3}, 0x0, 0x2, r1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') 16:35:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 988.048226][T32508] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=3 [ 988.091862][T32508] BPF: [ 988.102843][T32508] BPF:Member bits_offset exceeds its struct size [ 988.142322][T32508] BPF: [ 988.142322][T32508] 16:35:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r4 = syz_open_dev$audion(0x0, 0x0, 0x302c0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r5}}, 0x30) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @loopback, 0x40}, r5}}, 0x30) r6 = socket$inet6(0xa, 0x3, 0x6) r7 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r6, r7, &(0x7f0000000240)=0x202, 0x4000000000dc) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r5, r7}}, 0x18) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) read(r3, &(0x7f0000000240)=""/225, 0xe1) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r8, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) r9 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r10, 0x80000000}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000340)={r10, 0x2}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r8, 0x84, 0x0, &(0x7f00000003c0)={r11, 0x0, 0x63}, &(0x7f0000000400)=0x10) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 988.171952][T32508] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=3 [ 988.206128][T32508] BPF: 16:35:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 988.232593][T32508] BPF:Member bits_offset exceeds its struct size [ 988.270251][T32508] BPF: [ 988.270251][T32508] 16:35:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x4}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 988.613536][T32529] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=4 [ 988.629097][T32529] BPF: [ 988.632064][T32529] BPF:Member bits_offset exceeds its struct size 16:35:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000080)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x16400, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040)=0x4, 0x4) socket$inet(0x2, 0x2, 0xff) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 16:35:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbf", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 988.674973][T32529] BPF: [ 988.674973][T32529] [ 988.747382][T32529] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=4 [ 988.799084][T32529] BPF: [ 988.802106][T32529] BPF:Member bits_offset exceeds its struct size [ 988.865876][T32529] BPF: [ 988.865876][T32529] 16:35:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x5}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbf", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 989.255272][T32542] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=5 [ 989.309115][T32542] BPF: [ 989.312290][T32542] BPF:Member bits_offset exceeds its struct size [ 989.363442][T32542] BPF: [ 989.363442][T32542] [ 989.399246][T32542] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=5 [ 989.423949][T32542] BPF: [ 989.435064][T32542] BPF:Member bits_offset exceeds its struct size [ 989.458673][T32542] BPF: [ 989.458673][T32542] 16:35:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) chmod(&(0x7f00000003c0)='./file0\x00', 0x16a) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r5, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010003b0dfff300"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="140012000b000100627269646765000004000200"], 0x3c}}, 0x6000000) fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in, @in=@remote, 0x4e24, 0x200, 0x4e21, 0xffff, 0x2, 0x20, 0x20, 0x3c, r5, r6}, {0x1ec, 0x7f, 0x9, 0x7a, 0x5, 0x4, 0x6, 0x6}, {0x2, 0x2, 0x38, 0x9}, 0x10001, 0x6e6bb2, 0x0, 0x0, 0x1, 0x2}, {{@in=@multicast1, 0x4d2, 0xff}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3501, 0x1, 0x3, 0x6, 0xfc000000, 0x0, 0x7fffffff}}, 0xe8) 16:35:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbf", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x6}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') r1 = socket$inet6(0xa, 0x3, 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="5b051000", @ANYRES16=r3, @ANYBLOB="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"], 0x144}, 0x1, 0x0, 0x0, 0x4041}, 0x40) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) [ 989.810173][T32558] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 989.829826][T32562] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=6 [ 989.864215][T32562] BPF: [ 989.879979][T32562] BPF:Member bits_offset exceeds its struct size [ 989.937175][T32562] BPF: [ 989.937175][T32562] 16:35:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 989.996571][T32562] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=6 [ 990.005986][T32562] BPF: [ 990.017020][T32562] BPF:Member bits_offset exceeds its struct size 16:35:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 990.149368][T32562] BPF: [ 990.149368][T32562] 16:35:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 990.229860][T32564] bond2: (slave bridge2): making interface the new active one 16:35:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x7}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 990.282042][T32564] bond2: (slave bridge2): Enslaving as an active interface with an up link [ 990.452526][T32580] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=7 [ 990.500254][T32580] BPF: [ 990.513423][T32580] BPF:Member bits_offset exceeds its struct size 16:35:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 990.552644][T32580] BPF: [ 990.552644][T32580] [ 990.572574][T32567] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 990.591327][T32580] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=7 [ 990.648680][T32580] BPF: [ 990.665520][T32580] BPF:Member bits_offset exceeds its struct size [ 990.710985][T32580] BPF: [ 990.710985][T32580] 16:35:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fff, 0x40}, 0x2104, 0x1, 0x0, 0x0, 0x3}, 0x0, 0x10, 0xffffffffffffffff, 0x9) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x8}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000000)={0x0, 0xffe1, 0x3, [0x2, 0x7f, 0x1]}, &(0x7f0000000040)=0xe) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) [ 991.078010][T32594] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=8 [ 991.094122][T32594] BPF: [ 991.100726][T32594] BPF:Member bits_offset exceeds its struct size [ 991.116367][T32594] BPF: [ 991.116367][T32594] 16:35:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 991.189126][T32594] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=8 [ 991.196084][T32594] BPF: [ 991.198881][T32594] BPF:Member bits_offset exceeds its struct size [ 991.362181][T32594] BPF: [ 991.362181][T32594] 16:35:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0xa}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 991.787189][T32611] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=10 16:35:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7000000", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 991.831668][T32611] BPF: [ 991.846312][T32611] BPF:Member bits_offset exceeds its struct size [ 991.859257][T32611] BPF: [ 991.859257][T32611] [ 991.901629][T32611] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=10 [ 991.942486][T32611] BPF: [ 991.968395][T32611] BPF:Member bits_offset exceeds its struct size [ 992.011670][T32611] BPF: [ 992.011670][T32611] 16:35:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x24}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = socket$inet6(0xa, 0x3, 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000000c0)=r2, 0x4) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7000000", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 992.286526][T32626] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=36 [ 992.354283][T32626] BPF: [ 992.357435][T32626] BPF:Member bits_offset exceeds its struct size [ 992.384427][T32626] BPF: [ 992.384427][T32626] [ 992.410250][T32626] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=36 16:35:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7000000", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 992.461306][T32626] BPF: 16:35:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/nf_conntrack_expect\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x80000, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) write$binfmt_elf64(r3, &(0x7f0000002480)=ANY=[@ANYBLOB="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"], 0x857) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) r7 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000480)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r9 = dup(r8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8b22, &(0x7f0000000400)='wlan0\x00\xd6\xb1?\xc7\x9f\x1eW\xbe\xf7\x8aa\xc7Mz\xee\xac\xd4_B~NjO\x9bK\xec\xbc\"\r\xfa\x81J\x13\xd8\x9fg}r\xd3\xb4\xf6t\x80\xcc\x99\x17\x1eSp\x1c<\xfd;\x11\n\xfe\x8d\x1d\x8c\xfc\xa4\xe6\xddS\xcc\xcc\xfd\xb5\xfb\x01\xaf\xf8\xe4\xec\xc5q9\xba\x15;1$\x04=\x92\xb0M\xc5\a\x95\xf9\x83\xf9\xe2\xdeBk\x19\x13\x86-\xcd N\x92\x167rp7\xf5\xd3\x98 \x13\xda\xd4\xb9\xcf\xf7=\xc5>\x99\xfb\x9f\xb3\xdf\x8fe qN\xccR\xda\xbe\xa6\x04\xe6') accept4$bt_l2cap(r9, &(0x7f0000000000)={0x1f, 0x0, @fixed}, &(0x7f0000000040)=0xe, 0x80800) r10 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x52080, 0x0) r11 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x1c, r11, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}]}, 0x1c}}, 0x0) r12 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getpeername$packet(r14, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r12, 0x890b, &(0x7f00000000c0)={@dev, @mcast1, @rand_addr="657261c70996f4e1596272e2ec4688fa", 0x0, 0x0, 0x0, 0x10, 0x0, 0x20c204c6, r15}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xe8) r17 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = dup(r18) getpeername$packet(r19, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r17, 0x890b, &(0x7f00000000c0)={@dev, @mcast1, @rand_addr="657261c70996f4e1596272e2ec4688fa", 0x0, 0x0, 0x0, 0x10, 0x0, 0x20c204c6, r20}) sendmsg$NL80211_CMD_GET_WIPHY(r10, &(0x7f0000000440)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r11, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r15}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r16}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r20}]}, 0x34}, 0x1, 0x0, 0x0, 0x6}, 0x4000) r21 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r21, &(0x7f0000000140), 0x10) r22 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r22, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r22, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$can_bcm(r21, &(0x7f0000000200)={&(0x7f0000000000)={0x1d, r23}, 0x10, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="00230000000000000000000000000000bb45897455d1", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000000000006c8dc8ac97baed61"], 0x48}}, 0x0) r24 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r24, &(0x7f0000000140), 0x10) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$can_bcm(r24, &(0x7f0000000200)={&(0x7f0000000000)={0x1d, r26}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x0, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "6c8dc8ac97baed61"}}, 0x48}}, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r9, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="c837493fbaf4d129527f9b09b0a8e800", @ANYRES16=r11, @ANYBLOB="000226bd7000fcdbdf25130000000c004300fcffffffffffff7f0500190000000000140011800400040004000100040001000400050006001a010300000008000300", @ANYRES32=r23, @ANYBLOB="08000300", @ANYRES32=r26, @ANYBLOB="04001180"], 0x58}, 0x1, 0x0, 0x0, 0x20000051}, 0x0) sendmsg$NL80211_CMD_START_AP(r7, &(0x7f0000000540)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000500)={&(0x7f0000002e40)={0x1484, r11, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@NL80211_ATTR_FTM_RESPONDER={0x208, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0xec, 0x3, "a85a2c69917dee2e7f49c48772f068d3c83579be6735c62df31adfdff3e2563d4290209a456d349210d54aeb91f3187b707e7993cc96fea6808debeed655ba3240b66d88f25e22bf3e712e010db598afc47fb2f05bc1ee5deadb07f97ddfa2010a8e3197236184be17f46e2bc6c6257fa63d406f59c5c88a462a63148806cc055228d32afe9a9b1296ef2bbecd59143b80fd8db7354beaa321a8a638affb0956994e919c7cff04e24801420f169286ffe9ca759d2b567a9382d6cc4f1e3979b90efbdd89bced13c7fcf746b75f257c03591331f8befea86a24be8b0cc16aa369d88f354ded4819b6"}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0x8b, 0x3, "7b00e2b4c3c4641f6e79ce3adcfcaff6391153f6067089d081994cf3a701c72b74aada287cd51c5e0f33bb796a616f2ba4e6b935fd1964ce68c197be853a2e631e13e7bc0905300437a1a3adfdb5f4b0ba0fa656cfea05a80f71af690883d903e7c797c0db8a5f9a135a51046cdbfd9475dcadcfa8606f47d017c896f49512d1ddf74622ce7ec5"}, @NL80211_FTM_RESP_ATTR_LCI={0x87, 0x2, "c7c35f6d7f3d33f0025b86f6d446a6ae342430a4782b6e0b73ae9d2fc12d3166e879da020968974a6c037d3bba24119921fc0bbcf7e9b9c62c537442121213111b2608eb4fd7ed5f3d22b1916e9fa0a29fa6a85e9b56dc8988331f814171aef8e80d14a1774aa173545a77592e80260f7e050203d868db0611aea3002f2e0681dfda11"}]}, @NL80211_ATTR_IE_RIC={0x63a, 0xb2, "ff4611232ea142108217db719efe153c331c7e82762c54a696eaeea2ae74f4b793953b3d8ebf20b7670016547d323ecfa6198029b563c4b6cad807e3a6daeb353fc2349c60367f0340eeeab38404d83168a8a48ecb16eb9021c4296d084dc892a4158bdfcc65673d11268e10953674c432a876e878680f208767bd13ebf969582b06f015bbdcdaddfeb6c7bc98592d766132958589de63e52e98f6fed1d15d6e335c33749e128ac6891a87a62ef2da25962c0a17019e0cc6861b50ea8dd7335907813fd7e24b87918c175db803eb3bd89803b52aa672aeb0c32a078823ce3217309d6cc64121502174d759a9a0441a7ad6275ebe7a0e599d27fa788310b2854831701698726110d782b3ee5179d8a89af7cc952f5ca75b500b60a0975fb2c612347ad4dda8f22faebac8e2ada156de18761ea2fca83229f8469d4e049d96e9ba2578a8eab03064a66b8e9c6c021554ba6f1bbee3929947d3f9465e7383059e24240fa96cb940c0c5b89e9946cb1781830b0f76fa0a704b21730e40f2defef80c83b8e2a44c967bf6dd906dee18229b0d0529bbe4c675eb8134cda0cc64a8cbdddf6ab56e8871a5fba50a235699e42bae729f37300813ee3796327bf7edff0aa3bc8bc11de9df9553e9549916c1d52def5e8a4902374fcbc5c57d19b93ef9bf827e4737d95b4aebd91ecf9db52652905f499785e6a1442bb8b8bf445d26dbfe3f8c6f495ac937064356ee26ccf852c5985c428c3ca15db1e8c5e1f011020b46483a9a6b3bd8ba42b12d95e9d3b7e0f438c02c62e1f2496979502e1d3c24fa845f3e859ca7ffab0b91d44caefca79dc617c1a75783fb9fe8a1f691b1fa811a365300813fed85d4a9caead4b7fd729942d241a3921f980ee657b0a74047babfcf1419474c05ba2b27b3218963bd241dcd9e2504e19708104c46cee47313c90457dbcf3ac51c1a45782b6f1e8025d13dd9338584f981857301c7bfcf772ba46177d0c4fd7e03967050ff5e2442102d62c33c4b32743a85f8001cbaa76884102b2d59f64e9f04df112dca7b8d3ab2136c6f21b413cdc1b8bf301a7214ce6e8683c1c3bb7d0c24f82b0ab5d3406572500101956c97874bf9d6fd8c5ea6d8b4a42baccc199b196f8828ef3d002399f4fc3de3df4befc512ae866b06db341d0ca2e9f825d52df2a403426bde51aad7bd813f755a879d4317b65848328b4dd0bfae2ce6f888d73fc9e50c776a55e5e22ad22ab42d1f96b09c94e025b52b8a6c17af39ab764c15803b12c7bca11f9254e29e99d74532bb44f438e3246d50708e00540ed7f216ceee92c76cb6b8d56a5176281dbec7f78e1e58b562197272ce91042b6f61fe432ff0b3c14539ba655816434325e583df3af88974e291c30d9e16210e256f47f52dd7c0d001eeddad289680a6ac393383b233657aca9361971c5a9f5ade494f8c698255325ebad524956a6753b2313363f2ae1437e662a1e74e3753715aa5bd202db4702a8e29e7e0f7bd9a89d21b0a57639e50bf54eeb4bb19dcd8edbcc0622683c9215c996089d679e9435f324841bc5b1394e82ffb249e9507fe99807e02cad1f80c4ebc9c9f20b119c81274c4423a1413e02796f43d4b45f6e4361873efc88bd28956d791524a145e23f7a3716ca3aef773857c410ccf3dcf79dd23f916cacf6343a04374f8baff6c369e1a25999a6e51ea32b00ead498664d3905f71bf48367ba32d5e2c044729cb049d6e42a3a1d54f89c1a89ce962a6a0d002123afeca2b40b2b49b95b34d715b3b3fdcc4944bd6c5dfd01d48bcc2213c5f84fe87086e48ce4dabf2f6038017422bdc3411ced386ea08c933257aa59cc10ec9ca82f631e1f6458587e5c1c52a5f64b63597f0ef95683a682babe48f487ccdc5b72c1259f6687d62ec1e6a42f5ccef445cde7476f34482e08cb3d29ea4e770c720f603bfc97f0bbff3e4ce64040757009a15ea99521cf1e34c48fa45f966bef4be41dede54849c0916d4f460e539f32219f8bfdf8e9d800fc2de6d876821010cf0c847999652fab6f05b92b6a7fa50b8527e80b40de7199ce97600468bbf1a638413ad70da3837f7a91a63922bb137fd458d9155f9d210835313588fb3417b3d49e48eb8221062507e49bc7cb6883f6ada586dba0f207995d809e623db71af4917cfda633a698c4c87d51d271497647c43c67e978ca183afc56568d1121b6d9b3d3255fec439ac4d02ee8bd3bbdf0534ae4d6131296a6a2716"}, @NL80211_ATTR_IE_PROBE_RESP={0x31c, 0x7f, "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"}, @NL80211_ATTR_INACTIVITY_TIMEOUT={0x6, 0x96, 0xdf2b}, @NL80211_ATTR_IE_PROBE_RESP={0x8d6, 0x7f, "7d87e535ce538372d32769ad4ee24a46c7c63872ef94f733b21567f96796e63968f6a212418f625fa89225c93902e9c45c503547bc316c92928bc55e9743232efd4ccf36daedf43b97b5460f489746fe486e8ab44a5feb64798af46181f84d92b271895dd9edb0e9feed6fa91442f21ad40a390fa85b7bbf3c11901981ef1dd11b16635713e1cee8bbc48b264afc7cb995a17cae6b787cf8f21d50bb201f4fb6c9af0c8fb96c7079f9e9243c904420d3397fe4b04d924bbdbdb532f9e27e14317a170db65440fbc5a3f049df2c5bff5bd396ea060aa302ce25c5c3585be772094ccd8b3d5c86b68a56271d9bd14df4192f351a3420f9086738f4d857c854467895501fd8f63d52c440be6917dc85e1232e27fc7a13ea74c6f4bf43ae050eaa949b8baba6c36eecffbad5c989ef9cef460d814aa5d3ac29589b58309f67e06af17e1047f2b89999933f7dfdbd6e3c31980468ac7250030bf70808a9f43bead2250ff6701b9dc9ffd0fd9014c19c28c32d7be9d538eb0e49f514723c8542a62bb76e0357bc62ae7b2b6594eb09a34b31521508a29683ea96dd0974890ea1cffb66f527ebd440d85f2ce47e604e39e408f9cfcba99dc0b2a15cd5f7f6502736ee1338428450a6d1e1aae9985f3ebcbd1d298622e0583d717b3824570e54977481d07fdb45416073ec2516afd6809a8dd6f51358f9a0bbc3f8741e0bea1fd24cb7928b3e57548f8e9304b003c8d6f2fca047df1ebe3ee62173a30f9ccc9148a74059c6a46199d63fc819c5d6794bd9c377fbedd79f01486a0a6b8a6be09251433d357d19b94d5e1d5573e56ce661a31e811e289e26a19f4bb41f0eac26788642c5af1fea9d7ac6d375de1f71b5f7d685309aec48685faf94fcb1e5658a7b5883612b241efc16c74d6df1873a3c75882c6a8808a44a14edce410eb72af2834dc77a2f9fe43e7c8477252d935084d1a6e7cd43d47fdc35342b3cd8b7d8dfe1478777ba6b5929828b709b9f4a45a00b921a51c21e71522dac22901ebb79b1e12dd98e3940e979f33a0b5a36fcb07e5950132e1672fc8ab1badd6bde43666af6a0ea43a0a520e7b30c2b3df25e42487a63f320f01270eea5e6db4b51bae3fcab54062d1a5eedd4137fe2e61693597bf8ec480314efb1ab6c3dd90deddf892ed5334cccc4c97915fb87fff46093a807b2df455c6d6a984eda4766848e67bdc4afb5ea97176f48771ddff10ff4de77c402fd6766f4d61b64b0653b9a6a9e621fba058019cc2597ee2bce9c94b787aeef791847c96ead6fc4d0c3f1a6094ab8d9a355f21de9984f9602ad8662818cb4e860bf7f5f7f974b578f7f8f6f2e363c44bfbc790cdd39459b79ff33fc3a69cb9a7b090ab4f2a440911491d466b01286cae3b1bed1c0c5762db5db284df6b2a783552c5f2ca341e380fcded0e964ab85be1f284b79243d5dd1cb891909505ca3b5a4dba8e4136c4ebda765ad8813e955936fb15207593396c09576c88635e91a21b9687230b33d3e461185fb1a0b6ea2ad126d6e1983f035f30bdf29ff239db509c9620942e01cc31ad1bf8074136c7ec7d9ff97d8e8abc2ecde69da6b35913094b7ab553177352d865d3e52951f90aa090ca93ec02c9938b53bef2d54604017aef97e7d7c07a3c4993795d8081e22674140bc557d478867bc22ed18648b7530197dc1d7114588bef0354e62a6702eb22c6ea3852e7f6934c61e63f56e8ea0ec341b45ed13f826a2a54b0dfce5e19ff447f3ff6b36d911a0565962ffc6eeea4efc52101c46d965108a1b841d360420a52ad11ca78ecb88805f047404fe7cb530576507f68f4ea31a9306f6c5f2c1293c84fc2b52634f6c95d14918014dd2588a602689031425ca86c36db707e641af9bfb4f92f6ab709db632801ddf3216bbecfcfe259b848b7f7ae6ade84b08438908acaab4a6aae700047626fcfc72d255b4f92bcd2088eb589a67d2b9b52c26198ddbe8bdd8708f640a400640256829780ba3f655ac53b0de44a5f215fd1b34e96fece1464a414581b9c021378a389bc7291a218519c3e8dfd641038971a6cb493adfcf6759ee808effdbd0275e5784e8f2b42ad60979059bcee52b59fe5f0cf1bfa63a9c5fb9389015cd73e7a1b36c908f6d5f3bc8dae348d5701a4a090810a6c4f152452d06df28fc1338a2e69ec2b90806e9517c262516df0fdf93e33234b8f9f014de14d4c8933f93923af2005c8cc3b88d07e0450790feaa621d7fb15f59236e11e45ac3da9cf83b9f9505fd99e933f027aebe9aec531db310510644dd9c7a0c25499ebfc2e9514570c7f29b64e63fac875298b91735beacdbd4850f5c27e924aa7dd479bc82192fde9b3feb15403b47445bee8cadceaa1bc5025a31d6cb261e11646f3044e5d14f841c1520b9e9f3394feb882b5d099b8a7fa1ab9da41a8e031ab95e026eaaccb4aadef5a738fcddf18b2599d023ad155d1922bc7ee72ff2ff5e699736123e500ad559ae5ea0239fb924b718675dfd294c634befc0d5d4d1cf2ab5b810624a05f85d32ae957d41c041b32956738e9d1931629a4957cc75e677a96e7ffc905adcfe73d50172d220ed143502f10cfa6a388ba18e1fd49f50d4b6b7f93dba57a8e7570d61e46d9cae55767e2e2b3429eb2714bfbdcc0a1e3f13050dcf3c8a226cb32228155082f90ef4df131bd9ec63dc7c573c36bab3c4a16b3bd8dab6e826ac0607c5dd215768e7870faeae92fa43434686e7e681819bb03b8ad93b065e2a64002b39a53471ecc3c82443ace9fbb0bfcc7e38d02458aac1959dedf5956f2b617fc2877c147df35913bad13a41495a09129f6e600a1bc0c6d8c6af639529352dee1b9d3f8ae5f6f3d3e8540bbd481457e34320d274e247101080006ff85ee817bd4b84ee848b87ffeff3554478a0f0398c0982cfd97adfb72090a80c17d6018e79ea59c0f2cd40be2a114eb2e885975f3f085771350e6392c727b095bc2a9d0f38ac7243428b652ebe34f280d320032d1801a21669f413609fa7bbab350a5d25ff5fb6a65b8fc32745fc568af562a0027c93b60c47853bf3fe09be27f0a180a3700f922f3616408859f942b91fbe7825576825448f81b18b5599f408726d973c7ee51cece41b6acea1633998d6f3b24818117d3fe9120e67cfed6ee26cabe401053c462a6b893ee96e1df085afaca4ea0e"}, @NL80211_ATTR_CIPHER_SUITES_PAIRWISE={0x28, 0x49, [0x147201, 0xfac01, 0xfac0a, 0xfac01, 0xfac0d, 0xfac01, 0xfac08, 0x147201, 0xfac06]}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x1484}, 0x1, 0x0, 0x0, 0x4}, 0x80) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r27, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010003b0dfff300"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r27, @ANYBLOB="140012000b000100627269646765000004000200"], 0x3c}}, 0x6000000) r28 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f0000000d00)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r28, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x101}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7a0}]}, 0x40}}, 0x4000002) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000100)={'team0\x00', r27}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000180)={r29, 0x1, 0x6, @dev={[], 0x1c}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) [ 992.490087][T32626] BPF:Member bits_offset exceeds its struct size [ 992.505070][T32626] BPF: [ 992.505070][T32626] 16:35:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x30}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 992.823569][T32638] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=48 [ 992.844273][T32635] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 992.863622][T32638] BPF: [ 992.873465][T32638] BPF:Member bits_offset exceeds its struct size [ 992.903780][T32638] BPF: [ 992.903780][T32638] 16:35:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 992.926479][T32638] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=48 [ 992.937880][T32644] selinux_netlink_send: 22 callbacks suppressed [ 992.937903][T32644] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32644 comm=syz-executor.3 16:35:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 993.018740][T32638] BPF: [ 993.049099][T32638] BPF:Member bits_offset exceeds its struct size [ 993.054846][T32642] bond2: (slave bridge3): making interface the new active one [ 993.066731][T32642] bond2: (slave bridge3): Enslaving as an active interface with an up link [ 993.090610][T32638] BPF: [ 993.090610][T32638] [ 993.115089][T32635] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 16:35:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x32}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 993.165435][T32644] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32644 comm=syz-executor.3 16:35:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:49 executing program 2: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x2}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000300)={0x4ef9, 0xc, 0x4, 0x70000, 0x7fffffff, {0x77359400}, {0x4, 0xc, 0x3f, 0x4, 0xff, 0x1, "0b27dece"}, 0x5, 0x1, @offset=0x9, 0x2, 0x0, r3}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r4 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 993.252443][T32642] bond2: (slave bridge4): Enslaving as an active interface with a down link 16:35:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) bpf$MAP_CREATE(0x0, 0x0, 0x0) recvmsg(r1, &(0x7f00000004c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000380)=""/140, 0x8c}, {0x0}], 0x2, &(0x7f0000000440)=""/112, 0x70}, 0x0) [ 993.375511][T32659] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=50 [ 993.426013][T32659] BPF: [ 993.452413][T32659] BPF:Member bits_offset exceeds its struct size [ 993.498226][T32659] BPF: [ 993.498226][T32659] [ 993.538560][T32659] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=50 [ 993.621919][T32659] BPF: [ 993.629516][T32659] BPF:Member bits_offset exceeds its struct size [ 993.647056][T32659] BPF: [ 993.647056][T32659] 16:35:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x48}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpid() close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x4a42) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) close(0xffffffffffffffff) [ 993.946851][T32679] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=72 16:35:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 993.999955][T32679] BPF: [ 994.015394][T32679] BPF:Member bits_offset exceeds its struct size [ 994.069137][T32679] BPF: [ 994.069137][T32679] [ 994.144130][T32679] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=72 [ 994.199546][T32679] BPF: 16:35:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200), 0x0) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 994.226807][T32679] BPF:Member bits_offset exceeds its struct size [ 994.239202][T32679] BPF: [ 994.239202][T32679] 16:35:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x4c}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x11b, 0x4, &(0x7f0000000040), 0x5e0) 16:35:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000140)={0x7, 0x2}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) connect$can_bcm(r2, &(0x7f00000000c0)={0x1d, r5}, 0x10) [ 994.595330][T32701] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=76 [ 994.647584][T32701] BPF: [ 994.679122][T32701] BPF:Member bits_offset exceeds its struct size [ 994.685644][T32701] BPF: [ 994.685644][T32701] [ 994.749192][T32701] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=76 [ 994.800596][T32701] BPF: [ 994.817736][T32701] BPF:Member bits_offset exceeds its struct size [ 994.843352][T32701] BPF: [ 994.843352][T32701] 16:35:51 executing program 3: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000040)=""/46, 0x2e}], 0x2}, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8995, &(0x7f00000001c0)='bond0\x00') 16:35:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x60}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200), 0x0) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900), 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 995.184936][T32719] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=96 [ 995.209597][T32719] BPF: [ 995.220825][T32719] BPF:Member bits_offset exceeds its struct size [ 995.252328][T32719] BPF: [ 995.252328][T32719] [ 995.273718][T32719] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=96 16:35:51 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) connect$inet(0xffffffffffffffff, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 995.317701][T32719] BPF: [ 995.332239][T32719] BPF:Member bits_offset exceeds its struct size [ 995.349157][T32719] BPF: [ 995.349157][T32719] 16:35:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x68}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900), 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 995.765871][T32736] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=104 [ 995.789435][T32736] BPF: [ 995.792267][T32736] BPF:Member bits_offset exceeds its struct size [ 995.830528][T32710] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32710 comm=syz-executor.2 [ 995.869609][T32736] BPF: [ 995.869609][T32736] 16:35:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900), 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 995.941974][T32736] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=104 [ 996.008372][T32736] BPF: [ 996.017559][T32736] BPF:Member bits_offset exceeds its struct size [ 996.051396][T32736] BPF: [ 996.051396][T32736] 16:35:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r4, 0x80000000}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000000c0)={r4, 0x6, 0x20}, &(0x7f0000000100)=0xc) 16:35:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x6c}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:52 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) connect$inet(0xffffffffffffffff, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:35:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200), 0x0) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 996.382836][T32753] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=108 [ 996.419112][T32753] BPF: [ 996.422043][T32753] BPF:Member bits_offset exceeds its struct size 16:35:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 996.450713][T32753] BPF: [ 996.450713][T32753] [ 996.480267][T32753] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=108 [ 996.568192][T32753] BPF: [ 996.583451][T32753] BPF:Member bits_offset exceeds its struct size [ 996.639154][T32753] BPF: [ 996.639154][T32753] 16:35:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x74}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 996.946550][ T300] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=116 [ 996.993095][ T300] BPF: [ 997.017390][ T300] BPF:Member bits_offset exceeds its struct size [ 997.059732][ T300] BPF: [ 997.059732][ T300] 16:35:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 997.108032][ T300] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=116 [ 997.184294][ T300] BPF: [ 997.239487][ T300] BPF:Member bits_offset exceeds its struct size [ 997.307684][ T300] BPF: [ 997.307684][ T300] 16:35:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbf", 0x8) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x2002, 0x0) setsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f0000000380)=0x1, 0x4) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r4, r5, &(0x7f0000000240)=0x3, 0x4000000000dc) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f0000000240)) ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f00000000c0)={0x4}, 0x1) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x7a}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:53 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) connect$inet(0xffffffffffffffff, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 997.507459][ T315] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=122 [ 997.565154][ T315] BPF: [ 997.580194][ T315] BPF:Member bits_offset exceeds its struct size [ 997.628397][ T315] BPF: [ 997.628397][ T315] 16:35:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 997.666356][ T315] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=122 [ 997.708585][ T315] BPF: [ 997.725093][ T315] BPF:Member bits_offset exceeds its struct size [ 997.740114][ T315] BPF: [ 997.740114][ T315] 16:35:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0xd1}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 998.078012][ T331] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=209 [ 998.139759][ T331] BPF: [ 998.163158][ T331] BPF:Member bits_offset exceeds its struct size [ 998.194521][ T331] BPF: [ 998.194521][ T331] [ 998.225822][ T331] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=209 [ 998.258317][ T331] BPF: [ 998.275334][ T331] BPF:Member bits_offset exceeds its struct size 16:35:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 998.319445][ T331] BPF: [ 998.319445][ T331] 16:35:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbf", 0x8) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x300}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 998.619661][ T343] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=768 [ 998.649730][ T343] BPF: [ 998.661107][ T343] BPF:Member bits_offset exceeds its struct size 16:35:55 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000340)={&(0x7f00000000c0)="96d068e0fa93844989957ae42185a3d80701331003e5496bb08d0d3fa55b9f85e4f1abfaffe53a9c48dd24ff491ee23d61418f5e4e5dd7836f07f147e5bc3bd63d40f42ba2166618bd0ade5a50f29f758dabe7b3ee84896fa1104e87f2259ac1509d09a78791288c91500bebc6cedbe2e035fc8d", &(0x7f0000000240)=""/52, &(0x7f0000000280)="2575fb045d01b6db7ddb449c15da37200bbe73f59b5737f68b6654e3d21597760dfe1452bca04441f20f0f9382011c5f7c0a481cb08c8733acd99c7fcb39c2c03440a1ba63f96bb4693be76265a4eebbdafe45061743d3eb0718e18f934341a04906ef23eb9377d411d292516bf8329a5598ddcf5f6a87e0d0a3461a6f24be6ae2101396fe6889ca790288dfa7c2df1d8e046a209a524dbbff926122bce81e8a65eeaa9de457a1492e62a16cd1bb", &(0x7f00000003c0)="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", 0x4, 0x1, 0x4}, 0x38) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:55 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) connect$inet(0xffffffffffffffff, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 998.769124][ T343] BPF: [ 998.769124][ T343] [ 998.784556][ T343] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=768 [ 998.831351][ T343] BPF: [ 998.856849][ T343] BPF:Member bits_offset exceeds its struct size [ 998.899151][ T343] BPF: [ 998.899151][ T343] 16:35:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x500}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 999.290502][ T361] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=1280 [ 999.320226][ T361] BPF: [ 999.333854][ T361] BPF:Member bits_offset exceeds its struct size [ 999.399561][ T361] BPF: [ 999.399561][ T361] [ 999.435623][ T361] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=1280 [ 999.468037][ T361] BPF: [ 999.487849][ T361] BPF:Member bits_offset exceeds its struct size [ 999.528179][ T361] BPF: [ 999.528179][ T361] 16:35:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbf", 0x8) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x600}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 999.861619][ T375] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=1536 [ 999.885284][ T375] BPF: [ 999.899185][ T375] BPF:Member bits_offset exceeds its struct size [ 999.933365][ T375] BPF: [ 999.933365][ T375] 16:35:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, 0x0, 0x40000000) [ 999.954613][ T375] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=1536 [ 999.989322][ T375] BPF: [ 1000.020383][ T375] BPF:Member bits_offset exceeds its struct size [ 1000.049035][ T375] BPF: [ 1000.049035][ T375] 16:35:56 executing program 3: socket$inet6(0xa, 0x80003, 0x6b) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x10000200003) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) 16:35:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x700}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, 0x0, 0x40000000) [ 1000.292134][ T385] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=1792 [ 1000.322034][ T385] BPF: [ 1000.339975][ T385] BPF:Member bits_offset exceeds its struct size [ 1000.377947][ T385] BPF: [ 1000.377947][ T385] [ 1000.406105][ T385] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=1792 [ 1000.446682][ T385] BPF: [ 1000.461422][ T385] BPF:Member bits_offset exceeds its struct size [ 1000.489721][ T385] BPF: [ 1000.489721][ T385] 16:35:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0xa00}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, 0x0, 0x40000000) 16:35:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7", 0xc) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x200, 0x0) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000100)={0x2, 0x5, 0x1}) r3 = socket$inet6(0xa, 0x3, 0x6) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r3, r4, &(0x7f0000000240)=0x202, 0x4000000000dc) setsockopt$llc_int(r4, 0x10c, 0x5, &(0x7f0000000240)=0x7f, 0x4) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1000.849443][ T401] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=2560 [ 1000.900815][ T401] BPF: [ 1000.903658][ T401] BPF:Member bits_offset exceeds its struct size 16:35:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 1000.964339][ T401] BPF: [ 1000.964339][ T401] [ 1001.060251][ T401] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=2560 [ 1001.067325][ T401] BPF: 16:35:57 executing program 3: socket$inet6(0xa, 0x80003, 0x6b) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x10000200003) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) [ 1001.157471][ T401] BPF:Member bits_offset exceeds its struct size [ 1001.214815][ T401] BPF: [ 1001.214815][ T401] 16:35:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={0x0, 0x4}, 0x34901}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:35:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x2000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7", 0xc) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1001.706060][ T421] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=8192 16:35:58 executing program 3: socket$inet6(0xa, 0x80003, 0x6b) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x10000200003) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) [ 1001.764445][ T421] BPF: [ 1001.779976][ T421] BPF:Member bits_offset exceeds its struct size [ 1001.823623][ T421] BPF: [ 1001.823623][ T421] [ 1001.850066][ T421] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=8192 [ 1001.857404][ T421] BPF: 16:35:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 1001.920225][ T421] BPF:Member bits_offset exceeds its struct size [ 1001.961482][ T421] BPF: [ 1001.961482][ T421] 16:35:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x2400}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:58 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1002.412379][ T443] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=9216 [ 1002.501014][ T443] BPF: [ 1002.533344][ T443] BPF:Member bits_offset exceeds its struct size [ 1002.581856][ T443] BPF: [ 1002.581856][ T443] [ 1002.618251][ T443] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=9216 [ 1002.652874][ T443] BPF: [ 1002.667098][ T443] BPF:Member bits_offset exceeds its struct size 16:35:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 1002.705692][ T443] BPF: [ 1002.705692][ T443] 16:35:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7", 0xc) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:35:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x3000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:35:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:35:59 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:35:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r2, 0x0, 0x0) fstat(r2, &(0x7f00000000c0)) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1003.250033][ T468] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=12288 [ 1003.301505][ T468] BPF: [ 1003.319180][ T468] BPF:Member bits_offset exceeds its struct size [ 1003.353044][ T468] BPF: [ 1003.353044][ T468] [ 1003.430382][ T468] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=12288 16:35:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) [ 1003.499085][ T468] BPF: [ 1003.502059][ T468] BPF:Member bits_offset exceeds its struct size [ 1003.579365][ T468] BPF: [ 1003.579365][ T468] 16:35:59 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:35:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x3200}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) 16:36:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1003.861342][ T481] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=12800 [ 1003.897929][ T481] BPF: [ 1003.929942][ T481] BPF:Member bits_offset exceeds its struct size [ 1003.975389][ T481] BPF: [ 1003.975389][ T481] [ 1004.034774][ T481] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=12800 [ 1004.058783][ T481] BPF: [ 1004.077931][ T481] BPF:Member bits_offset exceeds its struct size 16:36:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) [ 1004.126295][ T481] BPF: [ 1004.126295][ T481] 16:36:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x4800}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:00 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:36:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x80000000}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={r5, 0x7c0000, 0x30}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000240)={r6, 0x1}, &(0x7f0000000280)=0x8) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1004.427791][ T498] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=18432 16:36:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) [ 1004.503889][ T498] BPF: [ 1004.523217][ T498] BPF:Member bits_offset exceeds its struct size [ 1004.599154][ T498] BPF: [ 1004.599154][ T498] [ 1004.640779][ T498] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=18432 [ 1004.729437][ T498] BPF: [ 1004.764314][ T498] BPF:Member bits_offset exceeds its struct size 16:36:01 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1004.809477][ T498] BPF: [ 1004.809477][ T498] 16:36:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x4c00}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7", 0xc) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) [ 1005.198702][ T519] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=19456 [ 1005.205951][ T519] BPF: [ 1005.226423][ T519] BPF:Member bits_offset exceeds its struct size [ 1005.269012][ T519] BPF: [ 1005.269012][ T519] [ 1005.325978][ T519] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=19456 [ 1005.386749][ T519] BPF: [ 1005.399120][ T519] BPF:Member bits_offset exceeds its struct size [ 1005.407945][ T519] BPF: [ 1005.407945][ T519] 16:36:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0xfe28) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008002, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665f46800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb76ea7211439a321f589f32be513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b143521435cb49840b0f61274420a5d97c3648665ff781c9e5dc445758addf261"], 0x48}}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000180), 0xff7e) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") sendmsg$NFNL_MSG_COMPAT_GET(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000400)={0x0}}, 0x5) r4 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r4, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0xffffffffffffffd2, 0x100, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000480)=0x44) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @broadcast}}, 0x7, 0x7}, &(0x7f0000000140)=0x90) 16:36:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x6000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:02 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1005.773510][ T531] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=24576 [ 1005.806208][ T531] BPF: [ 1005.816918][ T531] BPF:Member bits_offset exceeds its struct size 16:36:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x4004040}], 0x1, 0x4000010) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bind$vsock_stream(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @host}, 0x10) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SVE_GET_VL(0x33, 0xa748) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1005.860921][ T531] BPF: [ 1005.860921][ T531] [ 1005.923632][ T531] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=24576 [ 1005.949265][ T531] BPF: [ 1005.952288][ T531] BPF:Member bits_offset exceeds its struct size 16:36:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7", 0xc) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1006.029887][ T531] BPF: [ 1006.029887][ T531] 16:36:02 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b0304000000000000"], 0x19) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x100, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) close(r1) vmsplice(r2, 0x0, 0x0, 0x10) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 16:36:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x6800}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 1006.321924][ T556] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=26624 [ 1006.359144][ T556] BPF: [ 1006.361970][ T556] BPF:Member bits_offset exceeds its struct size [ 1006.368471][ T556] BPF: [ 1006.368471][ T556] [ 1006.391081][ T556] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=26624 [ 1006.411288][ T556] BPF: 16:36:02 executing program 4: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='veth1_to_hsr\x00', 0x97) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) recvmmsg(r0, &(0x7f0000003080)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x10020, 0x0) [ 1006.425032][ T556] BPF:Member bits_offset exceeds its struct size [ 1006.448137][ T556] BPF: [ 1006.448137][ T556] 16:36:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x6c00}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:03 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1006.854089][ T569] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=27648 [ 1006.892316][ T569] BPF: [ 1006.897588][ T569] BPF:Member bits_offset exceeds its struct size [ 1006.913474][ T569] BPF: [ 1006.913474][ T569] 16:36:03 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") write$cgroup_int(r1, &(0x7f0000000140), 0x12) [ 1006.980449][ T569] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=27648 [ 1007.007129][ T569] BPF: 16:36:03 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@remote={[], 0x1}, 0xa}) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r3, 0xc0305602, &(0x7f0000000240)={0x0, 0x1, 0x200e}) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x400000, 0x0) r4 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{0xffffffffffffffff, 0x101a}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:36:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb7", 0xc) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1007.034288][ T569] BPF:Member bits_offset exceeds its struct size [ 1007.089094][ T569] BPF: [ 1007.089094][ T569] 16:36:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x7400}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 1007.170510][ T580] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=580 comm=syz-executor.4 16:36:03 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r2, 0x0, 0x100000001) clock_gettime(0x3, &(0x7f0000000300)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 1007.457840][ T593] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=29696 [ 1007.489145][ T593] BPF: [ 1007.502537][ T593] BPF:Member bits_offset exceeds its struct size 16:36:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x18, r1, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_REG_RULES={0x4}]}, 0x18}}, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x10, r0, 0x0) [ 1007.577567][ T593] BPF: [ 1007.577567][ T593] [ 1007.633682][ T593] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=29696 [ 1007.677379][ T593] BPF: [ 1007.706112][ T593] BPF:Member bits_offset exceeds its struct size [ 1007.719104][ T593] BPF: [ 1007.719104][ T593] 16:36:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x7a00}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1008.021855][ T604] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=31232 16:36:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700", 0xd) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1008.065900][ T604] BPF: [ 1008.078631][ T604] BPF:Member bits_offset exceeds its struct size [ 1008.112930][ T604] BPF: [ 1008.112930][ T604] 16:36:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1008.152137][ T604] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=31232 [ 1008.172549][ T604] BPF: [ 1008.184583][ T604] BPF:Member bits_offset exceeds its struct size [ 1008.213829][ T604] BPF: [ 1008.213829][ T604] 16:36:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0xd100}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 1008.547173][ T619] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=53504 [ 1008.584942][ T619] BPF: [ 1008.600900][ T619] BPF:Member bits_offset exceeds its struct size [ 1008.637060][ T619] BPF: [ 1008.637060][ T619] [ 1008.665675][ T619] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=53504 [ 1008.701893][ T619] BPF: [ 1008.718252][ T619] BPF:Member bits_offset exceeds its struct size [ 1008.780593][ T619] BPF: [ 1008.780593][ T619] 16:36:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0xfffff}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:05 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1009.072346][ T629] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=1048575 [ 1009.089257][ T629] BPF: [ 1009.092082][ T629] BPF:Member bits_offset exceeds its struct size [ 1009.098427][ T629] BPF: [ 1009.098427][ T629] 16:36:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700", 0xd) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1009.150877][ T629] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=1048575 [ 1009.183504][ T629] BPF: [ 1009.190249][ T629] BPF:Member bits_offset exceeds its struct size 16:36:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x11) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x3, 0x4, 0x5, 0xc1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x4, 0x0, 0xd54e, 0x4, 0x96}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000180)='cpu&0&&!\t\x00\x01\x00\x00\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x2, &(0x7f0000000ac0)=ANY=[@ANYRESDEC=r1], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x80000}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r4, r5, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r8 = gettid() r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r9, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x4, 0x40, 0x400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x5d) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r8, r3, 0x0, 0x0, 0x0, r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r7, 0x0, 0x6, &(0x7f0000000100)='ppp0,\x00', r11}, 0x30) r12 = gettid() close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x4, 0x40, 0x400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x5d) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x3d2, 0x0, r13}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)={r13}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r12, 0xffffffffffffffff, 0x0, 0x0, 0x0, r13}, 0x30) r14 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r15 = gettid() r16 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x40000, 0xffffffffffffffff, 0x0) r17 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x79, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r16, 0x40042408, r17) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r15, r16, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r18 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r19 = gettid() r20 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r20, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x4, 0x40, 0x400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x5d) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x3d2, 0x0, r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r19, r14, 0x0, 0x0, 0x0, r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r15, r18, 0x0, 0x6, &(0x7f0000000100)='ppp0,\x00'}, 0x30) r22 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r22, 0x2402, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000000)={r15, r22, 0x0, 0x0, 0x0, r13}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x2, 0x3, 0x2) socket$kcm(0x2, 0xa, 0x2) [ 1009.211923][ T629] BPF: [ 1009.211923][ T629] 16:36:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0xffffff}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x5e, 0xe7030007}, 0x40010000) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) write$char_usb(r1, &(0x7f0000000000)="cd24a59379c487ab0a17763b02904c77d95ddd9629d1653a025ea3d7661b0fe7fea353598662136be399", 0x2a) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1009.552004][ T645] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=16777215 [ 1009.597602][ T645] BPF: [ 1009.621263][ T645] BPF:Member bits_offset exceeds its struct size [ 1009.661868][ T645] BPF: [ 1009.661868][ T645] [ 1009.696612][ T645] BPF: (anon) type_id=2 bitfield_size=0 bits_offset=16777215 [ 1009.723240][ T645] BPF: [ 1009.733216][ T645] BPF:Member bits_offset exceeds its struct size [ 1009.756080][ T645] BPF: [ 1009.756080][ T645] 16:36:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x1000000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:06 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:36:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003ec0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@assoc={0x18, 0x117, 0x4, 0x9}], 0x18}, {0x0, 0x0, &(0x7f0000002480)=[{&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="c4619f3d79034db1a06747c6d939759b19d2b079bbbbb9b401887a293bfd848d455cc97548cf7a847bdd824bc0339422dcd7aa328dbfba4a92a373dca41e5273b19a29a9556358228298099557d89c0fa50a55f0bbfb10f5c5ec3d5bec9d964aec6ae8aab507af52056f6833a1f750a26c2b0c6664dd192b76a55ee780d3d15acde4c36b3089dad372afd264eeee0b6cc85e1d75104e03a179146157ed0ee091c1aea593497b1bd28ae8d4ed2a34610aa3c41388319b8bd6f9", 0xb9}, {&(0x7f00000000c0)="2aefdf5b78e77fe4d0c6318fed8f1ce928109ff455266cd9c544371e25839aa6b84e670b283cf945d116af8c7c897ac2a5154a0387096f73d9b7a97ca37a324c64e33fc8ec205c14501cc88b50ed3347bcf4aa33f0dc9474d396916c7d26920259f17b425116e85d2cc483eabc9e823fe66674e831", 0x75}, {&(0x7f0000001300)="7b26d58a5bf33024fd6843a830de9080846ce77b402c7a28140b9b03c5fc0c01b6fe44fc2503b89267d09dc2c3c8d8b8b7bdb0ccbbcd917d8ed40b79aa9032808a9910ffe3671a422db45843d7977812a0179c521ebcb94d4e74dbfdf70d8bc53febcb3dbd11e983bcb1fdc3d6d6879de901a7f3834eff179494165244089f70d38f2f7cf178735f389d9a6f3e73db9a33bf0e20bbcee685e17c19657bfb544ece7ceb2f3fb961dc49710f6a6a8958bc76bc4efbf2a3a1962ebd87a3558a3d03179a267b", 0xc4}, {&(0x7f0000001400)}, {&(0x7f0000001440)="d3234888efeaa4f1f9a598688748875fdb710de9eb9d63fa4de572debc691034a19e16c93c47a9829c02ab848c82788fd680f0ca0c5c", 0x36}], 0x6, &(0x7f0000002500)=[@assoc={0x18, 0x117, 0x4, 0x2}, @assoc={0x18, 0x117, 0x4, 0x6}, @assoc={0x18, 0x117, 0x4, 0x4}, @iv={0x50, 0x117, 0x2, 0x3b, "136e7094b8360800dba44bf83d7451c79f0d039e21c55f646539860404afe5636dca92ccdd6bb694744194747071b15535f7cd7a126151d573057b"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0xf0, 0x117, 0x2, 0xdb, "75c2d7341b82ca06d25a612ff692985e6ca0e88d9821b7e128980d4dd5c6a6415c58c1a3cd2bc74398faf66de0c1a9ebb42bde02bd2db2557882e234eb5aab14578840069b4bd940784deb85c519b56758b3d6e64a3f6785d7a94f5ede121d4fca54ded8c887fe690b795ec81054fb8fa40f4f4951fb1e877f336db16452892ad2db4077e75b10208530c8f22a4eddb23866ba53598dcebb63948a3a758fc8e479af29f6c582a3028be0a1c286462b44d0df9afebdea0fde73e179b41e342d52d01d32afd436e892d78fe5cfe36e5fd253d38123295df0f567c1c8"}, @op={0x18}], 0x1b8, 0x4000004}, {0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f00000026c0)="0bf6702384471fbdcc7dd16e58f85b2d50d775dd34eefa92ef0b3881a1258f797f0d8bb044b96a0813ab024e", 0x2c}, {&(0x7f0000002700)="a25c70baad6a08a3ad8aa5226edf6d9533518e580e11f91a856ba6e47e0048c6b13a713e38c0c0a48993efae3dee8882c69c059cd9c9b0cc189e135d7a57159f0a417f6704db34b1cef4d504a770a3e70c6fc896da01c818b4ae5025e86ab26de1160f6b9023ba629451f16bf116aeb05e29d7b2c1c86c4b7feac2f544e0945083c010d3bf2e51cc364faddb9c384fc4c9f4d66b1156881a937f1d3f19bfdadc936627dc5a025883f089fbed2779995cf74f1ed2a789a3407a38c3218d84d0347d386ab6e6312e448e0d14fb53efb4a63ba3fb64f7fe", 0xd6}, {&(0x7f0000002800)="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", 0x1000}, {&(0x7f0000003800)="9506485583df33ea5e9779e7a2df8474556c201d1e58c931057ea75f22238e3ae82e6d60b7cadd1e03a660c91e34acbea1dedb91aceb4ea308bd186d0c12f14dc8ba6811d09be9ac221b4950a93fcfd2021f82a392adb90e1bc82af488c8d58ffdf3bc3e859318961c687c6d4ead06b18ffd661db47c43e6cc510113bef613869bc3084fccbcf3592c89a65b17ce64b3bbc213cda9ae66c35093b2d35239a0d2e12e8967c7aacd5dde263ac3a610284425dc99f53aec074540f571453049e3523fcd12e7c858ac4b3116e7a5702d52bb0b15aa10da97f93890373ae201454bf457559bb8581168c5bc549daf78a05ce91a7072e803df09", 0xf7}, {&(0x7f0000003900)="69be9d77b285d2bf1835df4b2eb1fbd8a1e8521db33d24398241ba7a4a39019e21ced8f8500f769a46d9cc4eedbf44433b47ac8dbb13f436bc5353232d6f6f50fc0990b540a39a06fbc4319c9d448abf134895eb9216a37bec3e7ea4b3fe463b09ce4f4939cf2d6ed7e9e910c3965ee132f20f3434c36dd04a776ae99e2bb6ddff09df07d889b6df7a964dc79c0de0880fbf13050214001c469219b15584a11165536c4ac79f453f2f3244990445dc5ccb6c1836274df344f7ba942ad7d1699bb87511fdcb690ad3fe88b6dfbda301f08ab1f2d26855c44c590c", 0xda}], 0x5, &(0x7f0000003a80)=ANY=[@ANYBLOB="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"], 0x1e0, 0x8048}, {0x0, 0x0, &(0x7f0000003dc0)=[{&(0x7f0000003c80)}, {&(0x7f0000003cc0)="d6276f3d2d059f659da4141c45284ac5fc2ece2307609e2e8bea67eb91b0b78ffaa4fee33428832658433071860c504dece2d1b26354af2e83246fb777f2cd2037d37e2f60806255a1c31fe0f464de408b08631bf646bba6acbae101a4b3a9b8b158cb0b4a3896b2cbd3a394060040f8618869b133f58b27ee67edd776d239efe80dfba1663ae1073e7aa107a61204c1174daa1a59205e5fb5d61e650cde13716a50d5838fda5d947f2d26eb052c74ea6e4bc47740518c7d754397108ad38f15b5050ad2c6c3a326325a09c00d27e959006651d6", 0xd4}], 0x2, &(0x7f0000003e00)=ANY=[@ANYBLOB="b000000000000000170100000200000096000000651749548615d4ebe18f8beae4b2825eb6aab086b0a13c6cded6539af9bdb6256ad6a113f01b47d93691eb70d9b82e0d805c760615c572db370accc5c10bab2425960bf40c1e967ea1b3b8397f3eca365d1def63a124b4206d51f0c13182e5ceb96ac1def51cbaeab2f89994975a1661c146748d2b7ddef02ec4b6903ebc3c0c0c6f89d10eef5c71ea8a38e3172ac35e4af398060055000000000000"], 0xb0, 0x840}], 0x4, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r2, 0x0, 0x0) r3 = dup(r2) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000003fc0)={0x5, "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"}) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1010.115833][ T657] BPF: (anon) type_id=1 bitfield_size=1 bits_offset=0 [ 1010.143682][ T657] BPF: [ 1010.158070][ T657] BPF:Member exceeds struct_size [ 1010.186720][ T657] BPF: [ 1010.186720][ T657] 16:36:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700", 0xd) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1010.220279][ T657] BPF: (anon) type_id=1 bitfield_size=1 bits_offset=0 [ 1010.250312][ T657] BPF: [ 1010.261554][ T657] BPF:Member exceeds struct_size [ 1010.278881][ T657] BPF: [ 1010.278881][ T657] 16:36:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x2000000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x11) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x3, 0x4, 0x5, 0xc1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x4, 0x0, 0xd54e, 0x4, 0x96}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000180)='cpu&0&&!\t\x00\x01\x00\x00\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x2, &(0x7f0000000ac0)=ANY=[@ANYRESDEC=r1], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x80000}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r4, r5, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r8 = gettid() r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r9, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x4, 0x40, 0x400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x5d) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r8, r3, 0x0, 0x0, 0x0, r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r7, 0x0, 0x6, &(0x7f0000000100)='ppp0,\x00', r11}, 0x30) r12 = gettid() close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x4, 0x40, 0x400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x5d) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x3d2, 0x0, r13}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)={r13}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r12, 0xffffffffffffffff, 0x0, 0x0, 0x0, r13}, 0x30) r14 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r15 = gettid() r16 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x40000, 0xffffffffffffffff, 0x0) r17 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x79, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r16, 0x40042408, r17) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r15, r16, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r18 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r19 = gettid() r20 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r20, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x4, 0x40, 0x400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x5d) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x3d2, 0x0, r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r19, r14, 0x0, 0x0, 0x0, r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r15, r18, 0x0, 0x6, &(0x7f0000000100)='ppp0,\x00'}, 0x30) r22 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r22, 0x2402, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000000)={r15, r22, 0x0, 0x0, 0x0, r13}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x2, 0x3, 0x2) socket$kcm(0x2, 0xa, 0x2) 16:36:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x400000, 0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2f) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1010.575838][ T674] BPF: (anon) type_id=1 bitfield_size=2 bits_offset=0 [ 1010.644070][ T674] BPF: [ 1010.654929][ T674] BPF:Member exceeds struct_size [ 1010.686396][ T674] BPF: [ 1010.686396][ T674] [ 1010.739291][ T674] BPF: (anon) type_id=1 bitfield_size=2 bits_offset=0 [ 1010.789339][ T674] BPF: [ 1010.812951][ T674] BPF:Member exceeds struct_size [ 1010.838410][ T674] BPF: [ 1010.838410][ T674] 16:36:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x3000000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:07 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:36:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r5 = accept4$alg(r4, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r5}], 0x1, 0x0) r6 = accept$alg(r3, 0x0, 0x0) recvmsg(r6, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1011.194274][ T686] BPF: (anon) type_id=1 bitfield_size=3 bits_offset=0 [ 1011.241356][ T686] BPF: [ 1011.268765][ T686] BPF:Member exceeds struct_size [ 1011.305977][ T686] BPF: [ 1011.305977][ T686] [ 1011.363118][ T686] BPF: (anon) type_id=1 bitfield_size=3 bits_offset=0 16:36:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x11) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x3, 0x4, 0x5, 0xc1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x4, 0x0, 0xd54e, 0x4, 0x96}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000180)='cpu&0&&!\t\x00\x01\x00\x00\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x2, &(0x7f0000000ac0)=ANY=[@ANYRESDEC=r1], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x80000}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r4, r5, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r8 = gettid() r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r9, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x4, 0x40, 0x400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x5d) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r8, r3, 0x0, 0x0, 0x0, r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r7, 0x0, 0x6, &(0x7f0000000100)='ppp0,\x00', r11}, 0x30) r12 = gettid() close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x4, 0x40, 0x400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x5d) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x3d2, 0x0, r13}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)={r13}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r12, 0xffffffffffffffff, 0x0, 0x0, 0x0, r13}, 0x30) r14 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r15 = gettid() r16 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x40000, 0xffffffffffffffff, 0x0) r17 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x79, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r16, 0x40042408, r17) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r15, r16, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r18 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r19 = gettid() r20 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r20, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x4, 0x40, 0x400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x5d) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x3d2, 0x0, r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r19, r14, 0x0, 0x0, 0x0, r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r15, r18, 0x0, 0x6, &(0x7f0000000100)='ppp0,\x00'}, 0x30) r22 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r22, 0x2402, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000000)={r15, r22, 0x0, 0x0, 0x0, r13}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x2, 0x3, 0x2) socket$kcm(0x2, 0xa, 0x2) [ 1011.406059][ T686] BPF: [ 1011.434556][ T686] BPF:Member exceeds struct_size [ 1011.453668][ T686] BPF: [ 1011.453668][ T686] 16:36:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x4000000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(r2, 0x0, 0x0, 0x4048000) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1011.826070][ T707] BPF: (anon) type_id=1 bitfield_size=4 bits_offset=0 [ 1011.860314][ T707] BPF: [ 1011.869211][ T707] BPF:Member exceeds struct_size [ 1011.918399][ T707] BPF: [ 1011.918399][ T707] [ 1011.956493][ T707] BPF: (anon) type_id=1 bitfield_size=4 bits_offset=0 [ 1011.986084][ T707] BPF: [ 1012.004376][ T707] BPF:Member exceeds struct_size [ 1012.021670][ T707] BPF: [ 1012.021670][ T707] 16:36:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x5000000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:08 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:36:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r5 = accept4$alg(r4, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r5}], 0x1, 0x0) r6 = accept$alg(r3, 0x0, 0x0) recvmsg(r6, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x11) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x3, 0x4, 0x5, 0xc1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x4, 0x0, 0xd54e, 0x4, 0x96}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000180)='cpu&0&&!\t\x00\x01\x00\x00\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x2, &(0x7f0000000ac0)=ANY=[@ANYRESDEC=r1], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x80000}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r4, r5, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r8 = gettid() r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r9, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x4, 0x40, 0x400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x5d) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r8, r3, 0x0, 0x0, 0x0, r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r7, 0x0, 0x6, &(0x7f0000000100)='ppp0,\x00', r11}, 0x30) r12 = gettid() close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x4, 0x40, 0x400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x5d) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x3d2, 0x0, r13}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)={r13}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r12, 0xffffffffffffffff, 0x0, 0x0, 0x0, r13}, 0x30) r14 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r15 = gettid() r16 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x40000, 0xffffffffffffffff, 0x0) r17 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x79, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r16, 0x40042408, r17) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r15, r16, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r18 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r19 = gettid() r20 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r20, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x4, 0x40, 0x400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x5d) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x3d2, 0x0, r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r19, r14, 0x0, 0x0, 0x0, r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r15, r18, 0x0, 0x6, &(0x7f0000000100)='ppp0,\x00'}, 0x30) r22 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r22, 0x2402, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000000)={r15, r22, 0x0, 0x0, 0x0, r13}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x2, 0x3, 0x2) socket$kcm(0x2, 0xa, 0x2) [ 1012.392852][ T717] BPF: (anon) type_id=1 bitfield_size=5 bits_offset=0 [ 1012.429436][ T717] BPF: [ 1012.432596][ T717] BPF:Member exceeds struct_size [ 1012.471051][ T717] BPF: [ 1012.471051][ T717] [ 1012.525818][ T717] BPF: (anon) type_id=1 bitfield_size=5 bits_offset=0 [ 1012.570552][ T717] BPF: [ 1012.596803][ T717] BPF:Member exceeds struct_size [ 1012.648992][ T717] BPF: [ 1012.648992][ T717] 16:36:08 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:36:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x6000000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@assoc={0x18, 0x117, 0x4, 0x9}], 0x18, 0x200488b0}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:36:09 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1013.075697][ T738] BPF: (anon) type_id=1 bitfield_size=6 bits_offset=0 [ 1013.114294][ T738] BPF: [ 1013.129806][ T738] BPF:Member exceeds struct_size [ 1013.157039][ T738] BPF: [ 1013.157039][ T738] 16:36:09 executing program 2: fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1013.221364][ T738] BPF: (anon) type_id=1 bitfield_size=6 bits_offset=0 [ 1013.228263][ T738] BPF: 16:36:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r5 = accept4$alg(r4, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r5}], 0x1, 0x0) r6 = accept$alg(r3, 0x0, 0x0) recvmsg(r6, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1013.303775][ T738] BPF:Member exceeds struct_size [ 1013.308763][ T738] BPF: [ 1013.308763][ T738] 16:36:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x11) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x3, 0x4, 0x5, 0xc1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x4, 0x0, 0xd54e, 0x4, 0x96}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000180)='cpu&0&&!\t\x00\x01\x00\x00\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x2, &(0x7f0000000ac0)=ANY=[@ANYRESDEC=r1], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x80000}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r4, r5, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r8 = gettid() r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r9, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x4, 0x40, 0x400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x5d) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r8, r3, 0x0, 0x0, 0x0, r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r7, 0x0, 0x6, &(0x7f0000000100)='ppp0,\x00', r11}, 0x30) r12 = gettid() close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x4, 0x40, 0x400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x5d) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x3d2, 0x0, r13}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)={r13}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r12, 0xffffffffffffffff, 0x0, 0x0, 0x0, r13}, 0x30) r14 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r15 = gettid() r16 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x40000, 0xffffffffffffffff, 0x0) r17 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x79, &(0x7f0000000ec0)=ANY=[@ANYBLOB="850000000700000025007eb687cb00009500000000000000a53dec29fe276240f076750753bc7b952ab5ad939c403054d8465c17a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e77854412286f230dfe4253888912e81748b4ee09cc6fab89f552c7544f5fc544ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf277811a13748aa6147edda46525e536d056847d9c00724ccfa95764d1089cc53209782b632fffbbb737eeeceb7fd1e5dd2e32bd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b01d7348e4ec6747c58a9bb2479590df27190c1aee6642566939f2d049837d0e7375adb62a41b4e94d3feae92a51ab5dda325076c5610f2a94ceb96e81f4f0dccf22c34d0feb10248efc1300a7c482fa15efccfa361e40000000000000000000000000000000000000056085de901d104648a78be2c9354cf1a611636647fe93830217a15b2371c7f7f1b0434746920a5c914ed7c979038126656576dcac0b49ced3d4beecc5f3cbe15d7ce2543f6a161804857ce8571f35d2294b864e806a4b045141d5ba7f333d9c3c83decec580c94079dfdecac99330e89d5266741bde5b50329a2a6f0dfb3fd135564f61cae5fdac66f4d92c5a7337e0000f6cf8b693ebc9bab44335571221024034ecd4b4eb072cd0cda9cf6f8417628e5ffd2c34ead6b6c18b44861d0a92f3a9f8ea5af0fd8e4f1bd0755b2725403ca968dd5ad4b9c51c30fb187566937145435e0e93f9a1a73c52c6cff22f1f35032032ed8553a036e154874ddb772be763f115e12f9c1e21200609ff213c5171dfd3dba6a1c12ff8463680574de32dee07069e0055f3c09ae876213d85ff2e27996ac265d896827e14065cf74c792198f22a09a3ebeb41c830d892f83e0db3747d7c70256cfd9f60de754b7e4be474aef6ab7016f820d3eab476244046caa6b7e4c3ef8a57e0ae0bac354da55e7a80cda5e74b1c1fade7afb46c5a757d854e40c4fef736f105a62bce0b3b469b4cafdc82c38af83f12e538abc9d2ce73db642602fc7d1e15b42c6e50e1e65647fee76754cf346da583ccabec4f6ba782ca3226aeb2152e938716b0929576317ce3f4b266e79eab9d5a34012e9b82b0ccf18d2b139148cff515a3d8617996ae16be29d82"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r16, 0x40042408, r17) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r15, r16, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r18 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r19 = gettid() r20 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r20, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x4, 0x40, 0x400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x5d) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x3d2, 0x0, r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r19, r14, 0x0, 0x0, 0x0, r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r15, r18, 0x0, 0x6, &(0x7f0000000100)='ppp0,\x00'}, 0x30) r22 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r22, 0x2402, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000000)={r15, r22, 0x0, 0x0, 0x0, r13}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x2, 0x3, 0x2) socket$kcm(0x2, 0xa, 0x2) 16:36:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x7000000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:09 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1013.695102][ T758] BPF: (anon) type_id=1 bitfield_size=7 bits_offset=0 [ 1013.749911][ T758] BPF: [ 1013.762606][ T758] BPF:Member exceeds struct_size [ 1013.844740][ T758] BPF: [ 1013.844740][ T758] [ 1013.871696][ T758] BPF: (anon) type_id=1 bitfield_size=7 bits_offset=0 [ 1013.878843][ T758] BPF: [ 1013.894511][ T758] BPF:Member exceeds struct_size [ 1013.919795][ T758] BPF: [ 1013.919795][ T758] 16:36:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x8000000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 1014.213625][ T768] BPF: (anon) type_id=1 bitfield_size=8 bits_offset=0 [ 1014.243158][ T768] BPF: [ 1014.252828][ T768] BPF:Member exceeds struct_size [ 1014.267090][ T768] BPF: [ 1014.267090][ T768] 16:36:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) accept$alg(r2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r5 = accept4$alg(r4, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r5}], 0x1, 0x0) r6 = accept$alg(r3, 0x0, 0x0) recvmsg(r6, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f00000000c0)=0x4, 0x4) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1014.288766][ T768] BPF: (anon) type_id=1 bitfield_size=8 bits_offset=0 [ 1014.313169][ T768] BPF: [ 1014.316085][ T768] BPF:Member exceeds struct_size [ 1014.335902][ T768] BPF: 16:36:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0xa, 0xa, 0x101, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) [ 1014.335902][ T768] 16:36:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0xa000000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:10 executing program 4: [ 1014.582875][ T781] BPF: (anon) type_id=1 bitfield_size=10 bits_offset=0 [ 1014.599140][ T781] BPF: [ 1014.602019][ T781] BPF:Member exceeds struct_size 16:36:10 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1014.659439][ T781] BPF: [ 1014.659439][ T781] [ 1014.690367][ T781] BPF: (anon) type_id=1 bitfield_size=10 bits_offset=0 16:36:11 executing program 4: [ 1014.769511][ T781] BPF: [ 1014.778463][ T781] BPF:Member exceeds struct_size [ 1014.796457][ T781] BPF: [ 1014.796457][ T781] 16:36:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x20000000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:11 executing program 4: [ 1015.172337][ T793] BPF: (anon) type_id=1 bitfield_size=32 bits_offset=0 [ 1015.217309][ T793] BPF: [ 1015.234726][ T793] BPF:Member exceeds struct_size [ 1015.257953][ T793] BPF: [ 1015.257953][ T793] 16:36:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) accept$alg(r2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r5 = accept4$alg(r4, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r5}], 0x1, 0x0) r6 = accept$alg(r3, 0x0, 0x0) recvmsg(r6, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1015.285160][ T793] BPF: (anon) type_id=1 bitfield_size=32 bits_offset=0 16:36:11 executing program 4: [ 1015.328010][ T793] BPF: [ 1015.339545][ T793] BPF:Member exceeds struct_size [ 1015.357038][ T793] BPF: [ 1015.357038][ T793] 16:36:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x24000000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) write$binfmt_elf64(r3, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x8, 0x9, 0x21, 0x6, 0x3, 0x3, 0x65, 0x8a, 0x40, 0x99, 0x3ff, 0x2c1, 0x38, 0x2, 0x7f, 0x4, 0x722}, [{0x2, 0x800, 0x1, 0x6, 0x0, 0x9, 0x8000000, 0x100}, {0x1, 0x8, 0x20, 0x2, 0x200, 0x2, 0x1, 0x6}], "fca70caf307783d75087ab096c51c9c7eb6027aca03dd31e9d7a28c0b80ee51f66f26ea23af3a73b0a8b736e854fd0042be191a13155d8e4a3e90be5d3a7c2fa22682be8ac8124aa05b76e21f7731441d17e58f6d02136203b111a614ff5314575d722120abd34b8e35d509c2441a5b795f8c0496a02ee16aff28a68bd00f7189f10608f3a931ae1d5dd8e020eb651d9cc4b2140", [[], [], [], [], []]}, 0x644) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0x441, 0x0) ioctl$SG_GET_VERSION_NUM(r4, 0x2282, &(0x7f0000000100)) 16:36:11 executing program 4: [ 1015.587781][ T806] BPF: (anon) type_id=1 bitfield_size=36 bits_offset=0 [ 1015.657377][ T806] BPF: [ 1015.668005][ T806] BPF:Invalid member bitfield_size 16:36:11 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1015.699240][ T806] BPF: [ 1015.699240][ T806] 16:36:11 executing program 4: [ 1015.721648][ T806] BPF: (anon) type_id=1 bitfield_size=36 bits_offset=0 [ 1015.756688][ T806] BPF: [ 1015.771529][ T806] BPF:Invalid member bitfield_size [ 1015.811548][ T806] BPF: [ 1015.811548][ T806] 16:36:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x30000000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:12 executing program 4: [ 1016.152555][ T822] BPF: (anon) type_id=1 bitfield_size=48 bits_offset=0 [ 1016.181462][ T822] BPF: [ 1016.184281][ T822] BPF:Invalid member bitfield_size 16:36:12 executing program 4: [ 1016.209111][ T822] BPF: [ 1016.209111][ T822] [ 1016.227937][ T822] BPF: (anon) type_id=1 bitfield_size=48 bits_offset=0 [ 1016.256757][ T822] BPF: 16:36:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) accept$alg(r2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r5 = accept4$alg(r4, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r5}], 0x1, 0x0) r6 = accept$alg(r3, 0x0, 0x0) recvmsg(r6, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1016.268091][ T822] BPF:Invalid member bitfield_size [ 1016.305625][ T822] BPF: [ 1016.305625][ T822] 16:36:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x32000000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:12 executing program 4: [ 1016.587106][ T834] BPF: (anon) type_id=1 bitfield_size=50 bits_offset=0 16:36:12 executing program 4: [ 1016.631698][ T834] BPF: [ 1016.641523][ T834] BPF:Invalid member bitfield_size [ 1016.690825][ T834] BPF: [ 1016.690825][ T834] 16:36:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000000) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) personality(0x4000000) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r2, 0x0, 0x0) bind$alg(r2, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x9b0000, 0x8, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x980901, 0x2, [], @ptr}}) setsockopt$MISDN_TIME_STAMP(r3, 0x0, 0x1, &(0x7f0000000240), 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1016.719127][ T834] BPF: (anon) type_id=1 bitfield_size=50 bits_offset=0 16:36:13 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) bind$inet6(0xffffffffffffffff, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x10000200003) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1016.782532][ T834] BPF: [ 1016.810141][ T834] BPF:Invalid member bitfield_size 16:36:13 executing program 4: [ 1016.860980][ T834] BPF: [ 1016.860980][ T834] 16:36:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x48000000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:13 executing program 4: [ 1017.154628][ T846] BPF: (anon) type_id=1 bitfield_size=72 bits_offset=0 [ 1017.214860][ T846] BPF: 16:36:13 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) bind$inet6(0xffffffffffffffff, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x10000200003) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1017.237382][ T846] BPF:Invalid member bitfield_size [ 1017.249793][ T846] BPF: [ 1017.249793][ T846] [ 1017.277874][ T846] BPF: (anon) type_id=1 bitfield_size=72 bits_offset=0 16:36:13 executing program 4: 16:36:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1017.329078][ T846] BPF: [ 1017.331982][ T846] BPF:Invalid member bitfield_size [ 1017.353045][ T846] BPF: [ 1017.353045][ T846] 16:36:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x4c000000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:13 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) bind$inet6(0xffffffffffffffff, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x10000200003) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:36:13 executing program 4: 16:36:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc0f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1017.779329][ T870] BPF: (anon) type_id=1 bitfield_size=76 bits_offset=0 [ 1017.839831][ T870] BPF: [ 1017.871962][ T870] BPF:Invalid member bitfield_size 16:36:14 executing program 4: [ 1017.906413][ T870] BPF: [ 1017.906413][ T870] [ 1017.938903][ T870] BPF: (anon) type_id=1 bitfield_size=76 bits_offset=0 [ 1017.990210][ T870] BPF: [ 1018.006192][ T870] BPF:Invalid member bitfield_size [ 1018.029556][ T870] BPF: [ 1018.029556][ T870] 16:36:14 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x10000200003) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:36:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x60000000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:14 executing program 4: [ 1018.332894][ T884] BPF: (anon) type_id=1 bitfield_size=96 bits_offset=0 [ 1018.409873][ T884] BPF: 16:36:14 executing program 4: [ 1018.479116][ T884] BPF:Invalid member bitfield_size [ 1018.479125][ T884] BPF: [ 1018.479125][ T884] [ 1018.481301][ T884] BPF: (anon) type_id=1 bitfield_size=96 bits_offset=0 [ 1018.519148][ T884] BPF: [ 1018.522099][ T884] BPF:Invalid member bitfield_size 16:36:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:14 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x10000200003) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1018.557940][ T884] BPF: [ 1018.557940][ T884] 16:36:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x68000000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:15 executing program 4: [ 1018.980418][ T905] BPF: (anon) type_id=1 bitfield_size=104 bits_offset=0 [ 1018.992060][ T905] BPF: [ 1019.004553][ T905] BPF:Invalid member bitfield_size [ 1019.021389][ T905] BPF: [ 1019.021389][ T905] 16:36:15 executing program 4: [ 1019.050891][ T905] BPF: (anon) type_id=1 bitfield_size=104 bits_offset=0 [ 1019.088155][ T905] BPF: [ 1019.112783][ T905] BPF:Invalid member bitfield_size 16:36:15 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x10000200003) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1019.139245][ T905] BPF: [ 1019.139245][ T905] 16:36:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x6c000000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000000c0)={0x2, 'ip6gre0\x00', 0x4}, 0x18) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x1, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x24, r7, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}]}, 0x24}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000008c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_VLAN(r3, &(0x7f00000009c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x4c, r7, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xf7}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x100}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000800}, 0x40000) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:36:15 executing program 4: [ 1019.483490][ T917] BPF: (anon) type_id=1 bitfield_size=108 bits_offset=0 16:36:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1019.549721][ T917] BPF: [ 1019.552652][ T917] BPF:Invalid member bitfield_size [ 1019.579379][ T917] BPF: [ 1019.579379][ T917] [ 1019.617046][ T917] BPF: (anon) type_id=1 bitfield_size=108 bits_offset=0 16:36:15 executing program 4: [ 1019.659050][ T917] BPF: [ 1019.684386][ T917] BPF:Invalid member bitfield_size [ 1019.707343][ T917] BPF: [ 1019.707343][ T917] 16:36:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x74000000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000100)={0xa8, 0x0, 0x1}) ioctl$DRM_IOCTL_AGP_BIND(r2, 0x40106436, &(0x7f0000000180)={r3, 0x100}) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:36:16 executing program 4: [ 1020.062590][ T931] BPF: (anon) type_id=1 bitfield_size=116 bits_offset=0 [ 1020.122803][ T931] BPF: [ 1020.140937][ T931] BPF:Invalid member bitfield_size [ 1020.185302][ T931] BPF: [ 1020.185302][ T931] 16:36:16 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1020.241415][ T931] BPF: (anon) type_id=1 bitfield_size=116 bits_offset=0 [ 1020.312809][ T931] BPF: 16:36:16 executing program 4: [ 1020.359540][ T931] BPF:Invalid member bitfield_size [ 1020.368286][ T931] BPF: [ 1020.368286][ T931] 16:36:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x7a000000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x90) getsockname$l2tp6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000240)=0x20) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) sendmmsg$sock(r4, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:36:17 executing program 4: 16:36:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1020.765115][ T949] BPF: (anon) type_id=1 bitfield_size=122 bits_offset=0 [ 1020.865429][ T949] BPF: [ 1020.902598][ T949] BPF:Invalid member bitfield_size [ 1020.937303][ T949] BPF: [ 1020.937303][ T949] 16:36:17 executing program 4: [ 1020.982894][ T949] BPF: (anon) type_id=1 bitfield_size=122 bits_offset=0 [ 1021.024821][ T949] BPF: [ 1021.046671][ T949] BPF:Invalid member bitfield_size 16:36:17 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000340)=0x9, 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40000001) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x84900, 0x0) sendmsg$NFT_MSG_GETSET(r3, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x98, 0xa, 0xa, 0x801, 0x0, 0x0, {0xc, 0x0, 0x7}, [@NFTA_SET_DESC={0x2c, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x80}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x4e}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x7ff}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x7ff}]}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_TIMEOUT={0xc, 0xb, 0x1, 0x0, 0x3}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x41}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x40}, @NFTA_SET_USERDATA={0x21, 0xd, 0x1, 0x0, "a73875e96994a703c01b77ebf59909e61aa3c145d7dff7d7ff08f71010"}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_DESC={0x4}]}, 0x98}, 0x1, 0x0, 0x0, 0x80}, 0x801) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r4, r5, &(0x7f0000000240)=0x202, 0x4000000000dc) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440)='nl80211\x00') sendmsg$NL80211_CMD_STOP_AP(r5, &(0x7f0000000c40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000480)={0x768, r6, 0x200, 0x70bd29, 0x25dfdbff, {}, [@NL80211_ATTR_PRIVACY={0x4}, @NL80211_ATTR_BEACON_HEAD={0x73d, 0xe, "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"}, @NL80211_ATTR_WPA_VERSIONS={0x8, 0x4b, 0x3}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x7}]}, 0x768}, 0x1, 0x0, 0x0, 0x40}, 0x20004881) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$alg(r3, &(0x7f00000003c0)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-avx2\x00'}, 0x58) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1021.083636][ T949] BPF: [ 1021.083636][ T949] 16:36:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0xd1000000}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:17 executing program 4: [ 1021.473775][ T968] BPF: (anon) type_id=1 bitfield_size=209 bits_offset=0 [ 1021.519113][ T968] BPF: [ 1021.530126][ T968] BPF:Invalid member bitfield_size [ 1021.560722][ T968] BPF: [ 1021.560722][ T968] 16:36:17 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1021.594808][ T968] BPF: (anon) type_id=1 bitfield_size=209 bits_offset=0 [ 1021.665171][ T968] BPF: [ 1021.683980][ T968] BPF:Invalid member bitfield_size 16:36:17 executing program 4: [ 1021.748242][ T968] BPF: [ 1021.748242][ T968] 16:36:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0xffff0f00}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:18 executing program 4: 16:36:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x44c42, 0x0) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000100)=0x9845) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, 0x3}, 0x18) [ 1022.161676][ T989] BPF: (anon) type_id=2 bitfield_size=255 bits_offset=16715520 [ 1022.199143][ T989] BPF: 16:36:18 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff, 0x1b6041ca}, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x1, 0x7ff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x20) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000180)={0x1, 0x1, {0x12, 0x6, 0x12, 0x8, 0x1, 0x9, 0x1, 0x8d, 0x1}}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = socket$inet6(0xa, 0x3, 0x6) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r3, r4, &(0x7f0000000240)=0x202, 0x4000000000dc) ioctl$RNDADDTOENTCNT(r4, 0x40045201, &(0x7f0000000240)=0x7) r5 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r5, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r6, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r6, 0x40106614, &(0x7f00000000c0)) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1022.220644][ T989] BPF:Member bits_offset exceeds its struct size [ 1022.279081][ T989] BPF: [ 1022.279081][ T989] [ 1022.287757][ T989] BPF: (anon) type_id=2 bitfield_size=255 bits_offset=16715520 [ 1022.334743][ T989] BPF: 16:36:18 executing program 4: [ 1022.367054][ T989] BPF:Member bits_offset exceeds its struct size 16:36:18 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1022.412311][ T989] BPF: [ 1022.412311][ T989] 16:36:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0xffffff00}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:18 executing program 4: [ 1022.929224][ T1014] BPF: (anon) type_id=2 bitfield_size=255 bits_offset=16776960 16:36:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1022.979069][ T1014] BPF: [ 1023.009171][ T1014] BPF:Member bits_offset exceeds its struct size [ 1023.016932][ T1014] BPF: [ 1023.016932][ T1014] 16:36:19 executing program 4: [ 1023.058252][ T1014] BPF: (anon) type_id=2 bitfield_size=255 bits_offset=16776960 [ 1023.125843][ T1014] BPF: [ 1023.157699][ T1014] BPF:Member bits_offset exceeds its struct size [ 1023.213164][ T1014] BPF: [ 1023.213164][ T1014] 16:36:19 executing program 4: 16:36:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r2, 0x0, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) ioctl$TIOCGPKT(r3, 0x80045438, &(0x7f0000000100)) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={'bond_slave_0\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:36:19 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xbfd3}, 0x0, 0x0, 0x0, 0xac215e7988d881ef}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x849b98222c8d92d5) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x4, &(0x7f0000000100)={0x8, &(0x7f00000000c0)=[{0xff, 0xf8, 0x0, 0x4b8}, {0x100, 0x81, 0x1, 0x3}, {0x6, 0x86, 0x3, 0x5275}, {0x3, 0x1, 0x2, 0x200}, {0x5, 0xf8, 0x0, 0x7f}, {0xfffd, 0x8, 0xb1, 0x9}, {0x6, 0x8, 0x81, 0xfff}, {0x8, 0x0, 0x0, 0x20}]}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000240)={0x5, 0x5, 0x4, 0x20000, 0x1000, {0x77359400}, {0x2, 0xc, 0x2, 0x95, 0xff, 0x40, "4b131ee1"}, 0x6, 0x4, @userptr, 0x3, 0x0, r1}) ioctl$FBIOGET_CON2FBMAP(r3, 0x460f, &(0x7f0000000180)={0x16, 0x2}) recvmsg(0xffffffffffffffff, 0x0, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r4, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) getsockopt$EBT_SO_GET_INIT_INFO(r4, 0x0, 0x82, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000340)=0x78) 16:36:19 executing program 4: [ 1023.552363][ T1033] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 16:36:19 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1023.617846][ T1033] BPF: [ 1023.659872][ T1033] BPF:Member exceeds struct_size [ 1023.737271][ T1033] BPF: [ 1023.737271][ T1033] [ 1023.748304][ T1033] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 16:36:20 executing program 4: [ 1023.781557][ T1033] BPF: [ 1023.792753][ T1033] BPF:Member exceeds struct_size [ 1023.843900][ T1033] BPF: [ 1023.843900][ T1033] 16:36:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x2}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:20 executing program 4: [ 1024.160484][ T1052] BPF:Invalid string section 16:36:20 executing program 4: [ 1024.225009][ T1052] BPF:Invalid string section 16:36:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x3}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:20 executing program 4: [ 1024.594390][ T1065] BPF:Invalid string section [ 1024.612852][ T1065] BPF:Invalid string section 16:36:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x4}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x1138a0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000580)={0x44, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'netpci0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x70, r3, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xf9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe664}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1000}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x20}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x3f}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x70}}, 0x2000c810) r4 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KVM_SMI(r5, 0xaeb7) 16:36:21 executing program 4: 16:36:21 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:36:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x240, 0x0) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r2}) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(r1, &(0x7f0000000240)=@l2={0x1f, 0x0, @none}, &(0x7f0000000180)=0x80, 0x80000) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1024.867070][ T1073] BPF:Invalid string section [ 1024.911104][ T1073] BPF:Invalid string section 16:36:21 executing program 4: 16:36:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:21 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x5}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:21 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x6}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 1025.211320][ T1093] BPF:Invalid string section [ 1025.216815][ T1093] BPF:Invalid string section 16:36:21 executing program 4: [ 1025.499025][ T1101] BPF:Invalid string section [ 1025.522716][ T1101] BPF:Invalid string section 16:36:21 executing program 4: 16:36:21 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x7}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:21 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1025.811684][ T1106] BPF:Invalid string section [ 1025.870752][ T1106] BPF:Invalid string section 16:36:22 executing program 4: 16:36:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001080)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, {0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000000c0)="48ffa35b996e3edf7b0dbf2675f4697377558b5391b37c552543a06c", 0x1c}, {&(0x7f0000000240)="80e89f7d0bf4bad9800c074a3d5e31f91c8e33638c371961a562f4f39ed9be32e782fc6df16b974870c6bb438cb07e1e144b0602579f68b4cc3cc249b0587c3fa5d7fa42b9dcf3200372c3ddce3a75c97199ea93b10ccc88c91a84da4e6e2ca4bf91da13ba254330238a", 0x6a}, {&(0x7f0000000100)}, {&(0x7f00000002c0)="f01f9fab9b58380a8d2177218214588d89f831f4d6163ea0f6b077dd799c113594483f4fdff9dedf06d151db07e862815055c7a929e82f2b14c226844a1df3edef537e77cd125605e37035ce6baab6489cf831988c93bf8ba74d57e97d67eba91f232a5af308c1ca874cae9e83d1fdd64f0b37359585798eb17db316afcab6686ee4776926d2f4d4e5673add60cea649b4f7636ce556a581a03748a4fd43adcc823ad0ab02d01b99941fa19549efb62f1b315dc2aca89b0211f426750188fca609381f7b", 0xc4}, {&(0x7f00000003c0)="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", 0xfc}, {&(0x7f00000004c0)="9cbff46961542f18ae19ef08dc7a15d308dc61cb57c4cd205661bb67d8cb3f663ae5884736d96f0338b3a731da9c1bdbe476c7e7c2aabefc1783fafe32f544480fbd30b8cb6aed7a0753aa0edd13ddc3e42e6a431529bd3f881abf3d18759b12fec7710621f5d19608d73a62ac0aa31f855944ff7b52ea894efc4ff367a5ec6a3d64b81aae773ec3760805b7f968274f7720eb2c16fc281abbcaf63a848b51086f541de9120633ea6a340e2dd37beab0c6a50251d0c4365f9faedaf182a14589d045cdc28a34d0bb9b5a40aa7eaa7cfe7becbf00c2", 0xd5}, {&(0x7f00000005c0)="9725b4b25e8d72fbb6213db3e39658315d8b5d6ebed45a8fb67f79eb15beda9dcf4315abd4cb2e67170eefd8c3f45ca1c5d76dd4b152f9bd644e3da880101ee6801cfe6772024d09a8ed439ca8b792746a0b591fd4bd22e5e8db1dd0eb341d1cd0bbee77dddc6c37757996687c0c9a742b33b557c0de9ddf4b20b1572eccf2ea21108cca8941dcdaa9a2c6079b4016ab839a6738ebcb332b75015edf1894c304549b34", 0xa3}, {&(0x7f0000000680)="1699d965d1b15f457051f619cbb80096520438013c832d6a4caaeb887726292503e5f300f18839d7672e8ef3e015352dd54c3db32d62622ccf664cd29f5ff4ffe0408202438501e449c115a881ced12056df276518f6912106192e7840eeac8bf2795e35e00ea239c5bd7a31fea4ab2ef23af82813c1d374720448596902422ffa09e08f72c5856427f32e8175d6f780bc6c6388bd1cc01c0e658ca8acee687fa1d2ba3e8dc06e30ba5447b404bec717b48ad625026e4a23cd80d9a631a1e6a3e8fb107c075e439d5a410f5135c6", 0xce}, {&(0x7f0000000180)="f3da9e9f07f321fb22d6c9af71cb04b43a9f3f8a12ab5de5a103111968459f15e4b60b6e1ecb69616d", 0x29}, {&(0x7f0000002480)="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", 0x1000}], 0xa, &(0x7f0000000840)=[@iv={0xd0, 0x117, 0x2, 0xbc, "9a726b494c37edfe1d3f0b08b250c6f42361e84f2aba14db7c6042abca3bdcec805c3c7ecebb2734b3c71889bf104f9019b2533e84dccb7d03a11c32ec7066da33427a284d702311c0139c18bc3d42c35333e145c87ad23444b80478dd69f53f0c8aff6c7c6b6358c845bcd93fc08b709c10593a69343f46260b0c21af01f57da8315f7618510b74ab5f5682479dcfc196b37f53fbddf766eaaa2e1f6b4ee55a51451ab348157b09cd42f850b4c114cf572f1d43e9ae8d3157a945e6"}, @assoc={0x18, 0x117, 0x4, 0xffffe32e}, @assoc={0x18, 0x117, 0x4, 0x4}], 0x100, 0x20000001}, {0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)=[@iv={0x40, 0x117, 0x2, 0x2a, "2d1d6a1ae233116ca4ed35014620095f6b6e32504690141328bf3f06446d6019903015d1f07e50d5e849"}, @assoc={0x18, 0x117, 0x4, 0x5}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x48, 0x117, 0x2, 0x34, "6db5fab823f6baf53656c72f62721a8574dda2bfa6698cae31b8e28bbc1088598bb33f5ae5a2ffee3e700af0afdd4bbcb563df78"}], 0xb8, 0x8000}, {0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000a40)="1773ad5adf391ca2a9c7898fa1ce566741eb6a77bbede6abe5d54cf0f93d5bd33d6748ddb7721db7a7c0b8bd4b60b9687688e9258f8d75feb8befa0e6b66465f61a05baca9921c444112e3736142f93cb062b32758ec93a5acc8ae282e2d6d22b5bd73d9a6cf2127382a2157eae9f08dd42c1e050471e970d8148db5d976544a12f2aaedf042d76caf609470e69f60bd1cbd2f8dc2f25820a7a6f407d824b5eabc6f72aa7263644b51a7f40d8ac608751b79272460c49336f55232092049499f1cd383c4a818a736f824ea12beaaa21e70f9ed06d4028bda17042c21093798", 0xdf}, {&(0x7f0000000b40)="26c6abd4c4c95b8fbe70c88e7641301f18f822154c7de1b5bc848341309c94fe61b233ce0ed797ad120ae294cdbcfd577eb50c300011c60aafd8ba5be231e3a12e1541f6c9d32b4211cbbeb5649087047fd19cc7c2add05a14f741282b366c18a51b1200f45032fb39235cdb895720743d7468e6d5e09775f3283bdb142d8169662b05c1e2d2b137c81ba59991", 0x8d}, {&(0x7f0000000c00)}, {&(0x7f0000000c40)="675b92c448835cc11e2936b3df383fb5056767190a7303ce2b", 0x19}, {&(0x7f0000000c80)="72492c348d12980363e0e86cc397c6a7c6ec4ef810d8b271edc1a850eea0bfb7fe67c25f337834a281c537f6395439ccc5be0d8cd8658a3eefc24017effd89c3bdb3a831a66e7ebdd4d1cf7038d20a148a83115ae93ca1054422963cec6aaaec9e7a5cc7f2f5ce28c6fef1c00e1e8a5558de57ff6683ad9671e5d15674c080717d48afb95bb5b504e162e3bcb0280229b35237d903eaf6471cd2df3b2d7567a6c044edbcab837804e3249d88cf3dbd1c3a44dab73fc6b0eb416404a61e74e8eccff81d3b2dfd2ff7f392960319bba1cacece1cae85897ea7200594f692425619ebe02118eb6dc8a7fe27c158006dce2e33d831bf36", 0xf5}, {&(0x7f0000003480)="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", 0x1000}], 0x6, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x248, 0x20008004}], 0x4, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x40240, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) ioctl$PPPIOCDISCONN(r2, 0x7439) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:36:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x8}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:22 executing program 4: 16:36:22 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1026.333501][ T1127] BPF:Invalid string section [ 1026.374237][ T1127] BPF:Invalid string section 16:36:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0xa}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:22 executing program 4: 16:36:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x43) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1026.639669][ T1150] BPF:Invalid string section [ 1026.683193][ T1150] BPF:Invalid string section 16:36:23 executing program 4: 16:36:23 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:36:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x24}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqsrc(r2, 0x0, 0x25, &(0x7f0000000100)={@remote, @dev, @broadcast}, &(0x7f0000000180)=0xc) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:36:23 executing program 4: [ 1027.061892][ T1167] BPF:Invalid string section [ 1027.093404][ T1167] BPF:Invalid string section 16:36:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x30}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:23 executing program 4: [ 1027.415325][ T1182] BPF:Invalid string section 16:36:23 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1027.469842][ T1182] BPF:Invalid string section 16:36:23 executing program 4: 16:36:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x32}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = fcntl$dupfd(r3, 0x0, r1) r5 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3000000}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc00c64b5, &(0x7f0000000180)={&(0x7f0000000140)=[0x0, 0x0], 0x2}) r7 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r7, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3000000}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc00c64b5, &(0x7f0000000180)={&(0x7f0000000140)=[0x0, 0x0], 0x2}) ioctl$DRM_IOCTL_MODE_SETPLANE(r7, 0xc03064b7, &(0x7f00000001c0)={r8, 0xffffffff, 0x6, 0x2, 0x3, 0x3f, 0xeb, 0x0, 0xfffffffa, 0x8, 0x1}) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f00000002c0)={r6, 0xffffffff, 0x5, 0x0, 0x3, 0x41, 0xeb, 0x0, 0xfffffffa, 0xc, 0x1}) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f00000000c0)={r6, 0xffff, 0x5, 0x7fff, 0x0, 0x2, 0x2272, 0x9, 0x2, 0x7, 0x1200000, 0xa8f}) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r9, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) getsockopt$ARPT_SO_GET_INFO(r9, 0x0, 0x60, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000100)=0x44) 16:36:24 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x100000000004}, 0x10) write(r0, &(0x7f0000000140)="1700000016005f0214f9f407000909000a000000002a00", 0x17) [ 1027.899124][ T1198] BPF:Invalid string section 16:36:24 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1027.940540][ T1198] BPF:Invalid string section 16:36:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x48}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x8, 0x200000) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:36:24 executing program 4: ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='cpu&5!!\x00\n\x00\x01\x00\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\xb6,\xd5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xc4,K\t\x9a\x06\xef+rY\f\xf8,Y$\x9at\xf4\x1a\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f') ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000004c0)={0x3}) 16:36:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1028.324436][ T1216] BPF:Invalid string section [ 1028.362335][ T1216] BPF:Invalid string section 16:36:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x4c}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 1028.683825][ T1228] BPF:Invalid string section [ 1028.713310][ T1228] BPF:Invalid string section 16:36:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x60}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:25 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1029.083186][ T1237] BPF:Invalid string section [ 1029.111105][ T1237] BPF:Invalid string section 16:36:25 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='cpu&5!!\x00\n\x00\x01\x00\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\xb6,\xd5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xc4,K\t\x9a\x06\xef+rY\f\xf8,Y$\x9at\xf4\x1a\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f') ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000004c0)={0x3}) 16:36:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x68}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 1029.523725][ T1251] BPF:Invalid string section [ 1029.560130][ T1251] BPF:Invalid string section 16:36:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) dup2(r0, r2) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:36:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000100)={0x10000, 0x100010, 0xde, &(0x7f0000000240)="31019c4be4618e1ea7785c58c5ffd2fa34a67060e566d9bcc81bafdc65c8aacdef5407059c93a2aae82f3ab711d95e6c733a5fd843f6015c0e6a3da673e1abf710c1b5fbd8cd7e872eaeecca1ad6b1e5339147877766ff40b21b2c562a591a5f6c9054707a831299405510ac43c4d9f3f5af1933385857cf517e5182688438873f5d9e2d91a5e0b567b4c7967e414d48480d606372d34a43caae39bbe3aa621bf9f2c5c6e9ded545b0848f617d9a12631156dd908ad05968c05677a44e9502c759a93cecf6fc9e854ef9bbb16e2f1aeb57b2f164c4be2a9d5aa6eee1e93a"}) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180), &(0x7f0000000340)=0x8) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:36:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x6c}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 1029.986386][ T1263] BPF:Invalid string section 16:36:26 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x3000000, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x9effffff}, 0x0) [ 1030.016275][ T1263] BPF:Invalid string section 16:36:26 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:36:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x74}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 1030.422895][ T1268] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1030.596711][ T1276] BPF:Invalid string section 16:36:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r5 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:26 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x3000000, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x9effffff}, 0x0) [ 1030.630759][ T1276] BPF:Invalid string section 16:36:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x7a}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000100)=0x996d) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000001c0)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) open(&(0x7f0000005780)='./file0\x00', 0x20000, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000180)=0xffffff7f) r3 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005640)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000240)="b0c9e8383e5ae3dbb2597a475459accd2664f71ca18f7b9ead70a1fa23f8c3bc298ea5145f7fae655c1577aba16be131988ec22f38f35889bc7dddfc742e6edf766a5150913dc2bd536f794ec658", 0x4e}, {&(0x7f00000002c0)="6d74b8887a8f58882a7124feca66dc9f016c61c68c94ff8c973fab0428f3357ed54b8be7fb5db12f26d22a146d9378ead6c9ba317abcc89d6a326e17baca2e1441b0be3bda9b1448c76ead5ba8ec5f374db264f888efe559e8a4e83d00f83f67ca883cf22dc16bfc1dc9380bc0ff862144989159901fd24cac61fe0517778ed29c67b1991ed117f7f8231bc4257ceae7e74673c90ce6070e3a68de6c788783acea85d4bd04b2f949be42759cfff2222a754e846c0efbd5c8e0d8b14d4420f878e9afeb980932ccf1f54387530b6231241a13ae780bff882efe5110aaba424d15ccfee57f6e25974d3dcbaab99b", 0xed}, {&(0x7f00000003c0)="c5d39f530b6622a986e8d0900ca1ed42d35c2a79b695d59851bafd8096dc164272735b51eb5ed97c1a389beb758b571af22abb591fff536401065533ba02e846e93e528837ce77", 0x47}, {&(0x7f0000000440)="abd5118eada4a79bf377c1a5a19e0a2ec0b1ecbfe1ccd5f6dd7007fcc880b583755826dc47d203f9f09593ba7787c77a6aeec4b5859386a38807b34d1f0889afffbe58ce24bcd83a083b6905038331148c68475c629fa5ceaef2a1e6d93b618325e77392bc232fe5f4fba1eb56d819c94c934f7ce921a9a31a623a70302dc7725ad26af05ebd47d310929ec0b0c97d2bc47d35c3ed4b42a32fa9cf88eaa6b1c6e62469ecdb9dac67faa30229a09a1f59c3d8ef05e71ddb3d738c1ce74867b1a58638d86ffbec9b0bd72e319624f2f3c1e3c3065b51b72a0c9a845c91472f13990e572d64037b398e14eacd890c4a1e14", 0xf0}, {&(0x7f0000000540)="32b5e5c006893a07845b69dcaca8c114ec9a7609187646e1c08bf591f564d944f10417f6f72c313a7ef8111759f419521ead4e418e7f58ff6084f3f1d98140be027b493e65bf7d2993470fc7727e93e2f9335adf118b8464657c45dbb4c36c51d1b8fb85926c83f731a26eb59f2b46327570a4506409888eb62ea1aa0edfced4d2c90ad594dd7deb86443f7c02064c8b8ee4b4aae5954724a56d4df7007e1ad2f111a356d92ca0b2710d5d2b7b30dc", 0xaf}], 0x5, &(0x7f0000000680)=[@iv={0x108, 0x117, 0x2, 0xf4, "3c4d7be680e2cacc8b0ca154d4c2e42030068a0937da03fdc63c5f72b1d1a2affa783f163007aa2641862afa9a713a1f78e629065f04caa40e27e3fed33b6716a5a4b629833c729bed1ab95e881d8fe8071fea55b80a9b2ebf16d5fc4882e3a685f7609fd29834876544907a335f49a86c82ac046a11de6186717b3133d8742070e3c710164acc15da8bf669611fc29cdf6ab6d9dd9f2b8cc5f7cc151d6d73fabede7d7df848151ca63995ca401d98319ac252dc187635868ad5fbfe755f96790a2d2899d0ad9c765118061441469b2dd411845637e3241f6706aa1ca5cd03c6297037630e0bb9e7f0ca0210216a5833ec489444"}, @assoc={0x18, 0x117, 0x4, 0x100}, @assoc={0x18, 0x117, 0x4, 0x1000}, @assoc={0x18, 0x117, 0x4, 0x5}, @assoc={0x18, 0x117, 0x4, 0x800}, @iv={0x100, 0x117, 0x2, 0xe6, "de335422e166f0b4fe9e5d7703a7d91cd1f1e0e151a4509015b949945a74bc1235e86f44f87a04f9ab7689b8e1444ab217a7dad0dc2f8f2143ebd14a16de96bf742da0d0340359bf560794fc3585898c09498af0d7645f07ae1bbc1923bf5632a2dfa806833ebabf3db48b66ce6b21d79d18d0f65dd2c2258dcccce95ee50fa5cd750e402ae4db6c07eff9e59baed787acf4c223fcb48720742981fbdd74fd35c563d8e6d4f4bedeba252f4149360f777b83ddd2a96b9a60cec6ff166c56c3ab44ab21abe706908fa437b36383d41a85d372094929bda66026092565e332c24453047e72d57e"}], 0x268, 0x40040}, {0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000900)="abc06410a8a1f2337c4be20cc84923aadf9dfe16ecaafcb3a062e9749561f6ccef45be88d068684d9884560858351f5e53aa9d1ca39dfe3e40090337db55bc3bf9f81ecc9c882c0fba70eb6489b437fc575f6b1607815cfd0b1be33a5bad839a018e6661abdb56e055b68f16138165f3d52a9b6621cd8ebcd2b9ce71b910afb0aa7f40e9384efca1ee", 0x89}, {&(0x7f00000009c0)="a4", 0x1}, {&(0x7f0000000a00)="02e0ea098ca00850748ab35bf7f84bb2c5d1f5266678177483b5f77101acccbf2a739df5717203de83faf5966535711b5b5a026e35598e8bf2a391247feeefb00bf20bdb00fad88a8dc7a67255c26b77fde11c850d98d32520b4853bad50a875b5829e2c3c2693d9def1a1c1d1fcc688f22472109d0553043316a60a2ec687bf1035965f0f1e0088ad86780ba598f6bf2130b5042a2ef098e074736dcbcc451bec574c68a475366b13c2f58d6b6641d94643759f2dc50856722d52987b894cb9", 0xc0}, {&(0x7f0000000ac0)="07c34a720b6fce0791197df4a9b43bd7a46e6abdb55ef1fa178f7d8eea8ab58c04bf23dffeba728781f7f5d20943653f54afb5280278e5efb7e1fd082ab5a42ab773f13041eca0fbaedb755303502424d5dad6b6e7e734fee0fcc72d4f0c8528fdba62ad9cfd0fbf40fcf284311e3121b9b28b95c335b69dd43f6cb9afd61a97b7fa9b27f9acc941a9f4754bc173307fd7a8e959bd9932951b8195ed505369e80c7ff23381fda8607afed14c5cfcd6f7c8ae370408d614b70499b8d0bb46d0df9840df4e8a13ab912ae70070f35a70", 0xcf}, {&(0x7f0000000bc0)="258a574b59cb242c517ffd50b1d4ecb88eb2c4b26648e67714f503c14c7d558e0a59682d5716f90cde3cc012c1163ad599c6843a297effa90513f77997c978a8b57dee5652dacfda3c28d346b351c44e6a1e5e1748668f7985497e30483d5d", 0x5f}, {&(0x7f0000000c40)="7882107ae0b6165425b4e182e2f2adf4680c7c1cca0d9d390122d370c740a001eab2d70584631372ab63bb3a2b5736d4c202ca6f598d7f612edd72e6d4d9114303528d25d3c161e5595bba9843874047687d042856e4ef1c632e1704d006f73c16ddb4cae521c8364ea25d390b78b03ace474c8d8c14cd48b221498f4f859667b637f41a6227cb9077cf9acb683ab2168802ccaa1c3a0ad32c15493f14f1ce6a402da5cf1118d7b17be5654b035737b0171ff2cc20e798c97dde6c36e2858bb4d37838a2f5361f89ab866078b97b22e3385acf18e7f5d2662ee484d2b43f299df99be134acc531c5232c0ff6d896a93d2b75cf5d8067d1fb4a03fcb87cf23f03ffd28bb6315bbfa035d57cb1e2d3a392833a779ee646f8f09b692980afa8fb0466955e1498545a566dbaf2db3311b2ab70b9b9691e0257bc26e63b5fa99615eb33b4fce1fed71b6aece46a77a6f7b80ffd76da0e1dc8936b29bf9a0f47f8af43bf4d6cbc0a54ed19d20859ce77c2363828b7d862a65b75cc8672c73214e22f972102462d8953411c54384a464ab1333364c6f7341654abfcafa9f1547ef4d0754b3f9fa0ea88f3baaa46ad003ab019c817096e4fc386649924ac653df4edb1f54a49b50d4eb5d4e81ce6c779b6d5b80db17bd9b2a0c6837c86817d2926f0802aba4c11d3b19fc68eacffc41c12938db3b1a42c0c1bad35241f94306c55fe2101898440f48ad2e7cf4cfbd8e9700aa504b5651b712d4651c2628153d13fec2d0cc0db5071aac483b8025c7f6455486e803f90135ebe9d6751d004836a83e98fa102c29488445b2a2a03d938ffae14b473037b1a8c5b8421999a3522c7e5cd6730920df0bac5341db91f0a417d01f5ec174f3b6a36c9a78eef3ba579200e17c321eb00bc5cc6bacd213042adf28a4bb6f19aec71a0ba09b56ffac71f1e1f5cf53686f2eccaf6783a05576a4134dbbf3b38f25068f685d9a557e8c14b7d0632ec2fa6cbd454708cbdb23b81e570b5a4277f3c97d742211bfd870a657616fe4c3c6f44a5953cd96c57fa4c214de663d806082c86f72e0ebc72f2a3f53fd90de1fecee056733d24f25eb10a85e033c48daf38207c5160db239b64adb932ba6efcbe787cee0811a84dcffd48c3fa0c4d61d065668ff338667d2bb29d862f33a37ee6681b20c4c023ef628b7ee0fb5c012c26bb16d12015ef1557752eff92b4f2ed17b4468e324ce81a24566f16e6049b885feb6b0aabd701bd24b822498bf126fdfa53adae50028b23fefba92e80ad32c1c333dba469da5f1d76f4076ca256899f37eaa597ce6f77d673a154643fc515d86cf2ad600009938ae364c4f279892d8b02fa865f0c724a73f2775f4290c23f3d6b15e67e2e7bafe659442402b4fa53e53c498183c46196633852bf55acc1c83180a1353bdaac90856807a33d75cbda344e5248cc27e1b601761d3850f6798926aa15d84fa637c4898b835d6fc2d4207582f982d6899f16b00cb84b7532e88f270970f456a0a9d72cc9567ec6ec21fdcd8b8bb27863a5d72c0bd7b162a342c63132970d482de06d59148220ae4c505b222eb04056c5aae7d6e4a37006e902bf98f1cd1a61005f9239dc87d8c2e725f1c89420c6bc7b569c84762715a2ade03a957d39e3c00c0fa0f375cfff2d980496c262c5f56f2cad368a4879ce406c516a3e123a66c02329f498700ed7762c24927c08fe009e1bc63db043026f06707a7f19a25236f096d61ad9622e1dd9639fda025e5615a3dbf4357d078a87d1f53f450ad6d736f2237e6b4bd3321adf73cb1ebd6806932105d024cb8ac071e572518b166c41a3b0c2adbb5c595fde83cdfcab765650e1ada317c3823bc70543e0787948f4bf905a18abbb1437161dc18c3135cb964d158a927a152f261577ccad50fa04d6b812aaa671624a1faecdf13bb024c40012ee818652d3cc0b1e0700e210de0a5b4f2c91b7a1cd833a925ca2c058fe7d116ebb2272a9ac6236254ad3cf3587c22efbafbaf4e2d3c73614ad44d5515f20fd995aa88130fe027ff4affb899931bd7d799615841cc28dff767960f45f3e82f258c9980d0b4318efdf24bd7ac7adf2687408ac751c846169654bfaf89678796d4f0187f321fa19d40c5d9e8695609d3639fa7e7d3a11ac710ff629287fde7df47c6e04629b55deed27965aa489a38aaf1567942b995a082f4eb2ea6e9fdc8d11f2a0b0230d20add4b9a16e460d39168b3ccf0f2853fd1cc760caba3d335db692754254bbaf0ef367f76cca835463b56ccc89ef3623ff7e36ca53ed98888448571e85398c5d73d96757fec36ac5d7cedad86294b84bdb5f4f698dc9d503866003dd25b630cd51d93b85088f8a507f07ed05c55ccc4ad575b9b5ec36f4cc02134de174125fcc0fde9ee87650879c8391b80be18888ef8a13849fa3fb4ce4bc5f6dbdcf5cc06cf2a7306f7c6262b3f7304f0cbacaf7a04420a0c8a10ce36c9042122e31840211a1fa887e08f9db322bf5b350100d96931470e8d439f5a21c58c3632ca9272cb3c459253f4f637a93bdf1b85a3c912d5633c5edc59dc27e3706ac88b0b3825a68499d0a9e552365eeb97fdf47e336863de783dcf192040e2110986da1dfab035ed004a74e32c0f9833d348dc86865d326fbe22581d6df96a112ccbcffee8ebf5bee893ea8b0c53f239ef08afacf48e747bacc3845dbccc0163b2d1fbb8506ab7ccd172755ac6d424e4b7a1f94383e62ebe188f0594794c0c01b1655038f57d6e179fc8a31829987efd1d8cc5f8b1a84c2162e8d6cd9b201ab6183a4a78d68da5bbb96318c9f850c2aee17ae9a4e86fd8def2d3a8c113dba6131089f0b2f2c74a4037b45eb9b71416b2ebe3dc2e82567d5d8d80f36c3dd4b3a53298e0ef9923e9596936597cfc28fd4d9d53cfa422d43ef41c3d09fa044c2b915b04a82f24a9c716f23a41182188a2c296e21915c299fdecab30356994db9dd6826cfe1ced6588157bb8f398f189a6ebf46d167205de6150a42149d775a40d80131b0fbcdcb002805e809bcdb7a68392cc2e12393192819631ed8f1921f651cb0afe32aaaf25608f58e86dab422d9f92dc76aefcaae59a9999577f10feaa1a004def061e9f4ed71de487f5c23cbe9247688e3def2c67bd660b0c7dd1e1a210b3828f751991878f89b7e868b304477d87a3c5b063c45b3b5bb0bffbf567588938af2f5d4507f534e672ab2421c9c8d3a681f0e6468fb774a19bc313121903e447e7ba0b1d548f276b477c086874a7acecc0b3570968181c9a81a3208931ba64b3347930c56029a359771334c0202f7bae965bc044deaeae19110eb461e66841a6e3c9c52165e3a40d952310b50747fe5d31b77e0ee656a6cf13f90c82f3235f23222727b8f4c11ab6f30826400f2eefdc9b98ced8cfa2234edf2aea77e5ab16fe6b47295a6ee8272b76ebd2d14f70d1f9c90f7c76131303d8bd27f18dfc243ea919a684a9ace0c2aae40e3a9b2096eded491a659c7bc1ae85304ca553bb96dfbf03288d16db2216a5f9e5878a35e3dc0fbc223c79a806032c4d4c46258f05bb30699f7e10ce8c281cce260ab2d98c3d40daa862d12b36a35d75784fad6dc5da951be229dbc3edcf147a4edb3cba87f0f1d4adb2ccc590a08a541e39a3888f6dc5270b3c2d870dd3c5fdaa6d28ea0469563e2e1e29254908963d1fe4589bd6429c38871eb31c28eed5cd6fb86b760d1b3d9acfe85787d341318e889f5e99bafd30e622a70722dfa00ff56d7608abf060fc86f1cb4a9d23b526f3fcf22a8c3ab04ae133c7f37296c9257920430bf0986dbdd0846cebe45cc4c25bbc5567bced575466b72c69eb9b287f91a0c0f317a310330630288a881e4166cc2de5b04f2e16f10858d7324c7e520d15cc0a5d0a4f399bdd2561ceb95cc84883790eb97097aee6fdfedcdb9f08955c04baf788532ea897a7089c28f66915b1644d36f96ce39c8b2fe0b6f21ff24497d56b3a8c5c001d332349c156337143da10f820ccdedb4b738159c74444551a5872bcd13dfb0617018ae77ef088c2698475e99fc471634d08758b63261e6a3f7b415131ae217f7cd48d1edd9e6a80ca8aa8d081d17f5a4502f795dd3cd6af3e88ad96e104064697bde43d2c0f2f3f6a21b325f6b7c310b39565b7b73b74308d3c4a28cd125a07d956a6b188969220afda243d823974423f417795a5c2cf986a59e57c615cafbb3a891be4c602b0825a4c78ae33b41666c6425a3de91d4ba2c5346ef27df4df3f0aa299c72196e47fcd3137f043f008113da4d2f67fd0a6d0784f24565a5e3a428167f67a64effea2e142840638e3bc91c7c24e2ba23909b90409cf9ee867904ac0d5a5957d32c3ce8774e47acef6132bbf106ba0509c885a174dbfa87266a0badaf795bdc36f5a47716794b8e26043b64670a108f83d8ca0df37aa80ac6950beb417b0e85c8e5cc1b7a4e3810eaf73fc0488b6b6fa918c399544d9841d3c69604c29b0aa52a2dd773992a6d74a7993640bceb9205ab31cf30557cc204ed0cc2c66e1c383d0dc847cc6ba4c2e7168e89c9401edb56494bf81067d49dca8f8369f7fca015fed3da610c9e8d284cb0b07acec20abb2ebf8e250925fa9eea6dfb487535d342588764100d9b931611cfa2f9f79ebe651baa43dad9546518b0c348875cf0e294fe2642d7b92c3fb89be174b81a6f82f12d4508b171272f344f95086dcc4ddf276b62a575b2fd037a54f2785a74bc92e7cc7c9a125db9d40eed7c9455cb79c35dd7f19f94092aac6ce61e2fe4fa1d8f662995277efa386228c31358eec4ded793d21fea6a2623374e18a094ced39d40877ea6c80a1699d002e1d5aaf812f37c2780d3e12d003b63d0a40ec17a4d3dd7377fea6f7f7cfac4f8815357fba6586a63820d37576878b416bf4c0440934ec6d26b9ff46b3e8181b7dcc92d865612120bb53df158a0baf5dcbae18527b92776fee9cc3dcd4a9678fc398c141af5ad05dd7c21b284c824585909669f0681cc904eb60fca6ce3d13e20e73770208e6109d6ee85cc4dd77b973e3b47076b7c736a3df12b1fc97c588405cd66dc2761ab2dce52584d2e5538b1126f91fc75d2f1f0beb93f1cd1c9f9ec2a59a2e568049d5905013bc396e67038d84deefda73019a92b5ae25ea618fc6f1212c9c358fb7a8436b5287f55922279c5b7ffdc746ae9c192b763ba7aaac21d25d491a441dc2ef6985aabe2b18164e17cf1430866e919ad8231485883a1dc36ebf60e196e2ac798b36e748ee796f645531e858fbb62b168f9e65ad8444be320bedd5457ef820e5c4b9b516b0fe58dba91a2d409eecee17d81b5cd018aaced5236b080778aea54321b2917a3b1677504eca3d2c354d6e13f0b89aef1e3da45e65c46162965759e05ce5c7e5697d88794253676c03961ac3d601f3a7ddcb5ac1862cebeb0ff681d896910cb8c2c680a80d0b67ee0aaea6c675c8de07e575450d79c806bd972aba53448461d50296d5c0ffefafc9bdd06c30275af44159dea4b89e99c95755a9813aea8519db918d358b40bf38682dec77d6bb27bbedaf17dc256c95bc06da8c24a102cf55cd86d78ad3d72184deb18fe6f15c315f5bd3f6a5672cff98598d4e0ad768573d0dd62ad4e491c0a25f3148cb92ec24995f38920f81e09667774549a3a443b18d1c4ff688232385e71232b8dc296daf2645b81a9b68f9b674ccc1ce14b09fd5596fb02c610bdf74471fac5c7c18cb10598971fab2c6d8640face6aad4144c119c0055a5b8e5ba6a94a56bcb43b70706d50", 0x1000}, {&(0x7f0000001c40)="593f71ef64fc174c73b7f29e11921d97aa89d34353e66a27", 0x18}, {&(0x7f0000001c80)="354e99d6c2e006ba5dca99d658f04ae37d4065467bacaae1031f715b3e3bf4ea57118a34fbab7df7356a1c293f0f99f1fa7c92ed18828ac430a301f1ce03509fd371663570575d8272d0ade48af44bbe0bc9ec302a2fd4c65a57363f9ab208c96c112ea16664d89714feb5f0b6577417fed88b", 0x73}, {&(0x7f0000001d00)="2ec0bdf62dc9ed8ad8d067d277f65f1d605be6cd7dee8e11efe4ebc9eb86ab99bed60942ecde3d5bccfb9ed34b6fc285a807c903b3ff59845bf085d515dce58a3380de70b3b5358fce3b46ad1a9cdffcfbb4065ee0248d6074fa2694802d15f17f8c0bcfb6301b163a2b1cf205513d7c4d38fb013ad8cb10870cc1d960cf23d2ebe145f852cbf9c9f56dc09f9c3e0be9e03a53bbddd0be59fa458ad9ff004cc7cda98d", 0xa3}], 0x9, 0x0, 0x0, 0x4000004}, {0x0, 0x0, &(0x7f0000002040)=[{&(0x7f0000001e80)="0a5168aea862bc8fd0b36df6a47ed67c70b92b7858479931e45883e1a36a0e576d616a609dce3ff1281300537b9750f150d99f8920408001cb553134cae1e5cefa4fe6bd", 0x44}, {&(0x7f0000001f00)="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", 0xfe}, {&(0x7f0000002000)="e2cf74a38f091dd9b8526070f136467b6d983cb0d91acb4ca9c7a0ef028ef979febd6e57241fc92c3b05", 0x2a}], 0x3, 0x0, 0x0, 0x58379a5609b6032d}, {0x0, 0x0, &(0x7f0000002140)=[{&(0x7f00000034c0)="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", 0x1000}, {&(0x7f0000002080)="de27d812ea275dfa93751140cc6d76de320d0694f5abb2142974bfe320ec51a2b1db73936344e4323db17f47958b7ff3b902b1fac8fb844464f83bc177e69afb5a8e9b7aedfb50a853da9708a6d66c", 0x4f}, {&(0x7f0000002100)="a252143541240f8de7", 0x9}, {&(0x7f00000044c0)="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", 0x1000}], 0x4, &(0x7f0000002180)=ANY=[@ANYBLOB="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"], 0x208, 0x40}, {0x0, 0x0, &(0x7f0000005600)=[{&(0x7f00000023c0)="362b3dc34aa423aaee7c198076c21b9c86e06d524af50c07e2daf424cef0e21a46214c805bb80e1153d07c3d4cb1436228f319d490562e9185291675a1a1f858ac14709c28c4168239517ea32accec80ca522c662cdc16e21cb4767ebac6074585f2653263243471a18df4e8bc23232176331ce002e33fe3e70d00b8501b701b8b030946ab04f7db6c21572a981edac3b854dc954860b944dfd75a04df0b7d60538ae745023f9a26d8f2e076364358accf161797df3abb295cdb", 0xba}, {&(0x7f00000054c0)="432ddb78e8fc23b7838724e3b892927926071279f865b94bede7a1205c96c7fb97a16db6d0be758afda8ad9cdeae0dcd37e3d2e589266aae8ff09fa1354c739851936b57ed991c3bfe82a92b3475cf34c11055459c90d14f7c49da85e1889c10643612b9056edbb4450c5b0a9842511e584944064fcbe8f068749988f65b677f4f04397889b9e1068434cc06f767", 0x8e}, {&(0x7f0000005580)="ba0b71951dd026d2481811c952e4d9d2041179ebc3402e10995a9304d6d78c041f6e41f25f76bb39e1404c2c3449298c4f41c83f429fd8026c6618e9cd83b3442e188d730d2033dbcc6b", 0x4a}], 0x3, 0x0, 0x0, 0x10}], 0x5, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002480)=""/4106, 0xfef3}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) setsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000057c0)={0x0, 0x1}, 0x8) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000002380), 0x4) 16:36:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) socket$nl_route(0x10, 0x3, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, &(0x7f00000000c0)={0x6, 0x7, 0x10000}) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) syz_open_dev$ttys(0xc, 0x2, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1031.134435][ T1294] BPF:Invalid string section [ 1031.206668][ T1294] BPF:Invalid string section 16:36:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0xd1}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:27 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:36:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0xffff, 0x220040) ioctl$VIDIOC_S_CROP(r2, 0x4014563c, &(0x7f0000000240)={0x9, {0x3f, 0x6, 0x10001, 0x1}}) recvmsg(0xffffffffffffffff, 0x0, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x20100, 0x0) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x80000000}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000100)={r5, 0x8}, 0x8) 16:36:27 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='cpu&(!!\x00\n\x00\x01\x00\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\xb6,\xd5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xc4,K\t\x9a\x06\xef+rY\f\xf8,Y$\x9at\xf4\x1a\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f') [ 1031.512589][ T1304] BPF:Invalid string section [ 1031.553060][ T1304] BPF:Invalid string section 16:36:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r5 = syz_open_dev$vcsn(0x0, 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)=@newtfilter={0x23, 0x28, 0xb37}, 0x24}}, 0x0) [ 1031.923743][ T1324] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 1031.952089][ T1324] BPF: 16:36:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@iv={0x70, 0x117, 0x2, 0x57, "912719953249a64ec7ddfdb026c93bc55ebdc4d6a3f7e135f0005e7fe44fef8a420070985bed1fa86c23f6165ad84570379d0d7abdaf44b4dd42ce9a758cb2c8d09554af661abfc6dde0b7ddbb044e2a512e5be62ee044"}], 0x70}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="646973636172682c73686f3368acf3878e6fa874732c0062fcd9a5ed72de07ceb630c160fc6e759f4aaebd7caa088891d35b1552a0e797c75a7f601a07b3434683cdaccaec68a80cf156dd15dcd3c5f42a3461132976cdabdc40030cca7ff0"]) ioctl$CAPI_SET_FLAGS(r3, 0x80044324, &(0x7f0000000180)=0x1) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002480)=""/4126, 0x101e}], 0x1, 0x0, 0x40, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1031.955901][ T1324] BPF:Member exceeds struct_size [ 1032.002313][ T1324] BPF: [ 1032.002313][ T1324] 16:36:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [], 0x2}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x14000, 0x0) socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f0000000340), &(0x7f0000000380)=0x30) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r4 = socket$nl_crypto(0x10, 0x3, 0x15) accept4(r4, &(0x7f0000000240)=@in={0x2, 0x0, @local}, &(0x7f0000000100)=0x80, 0x800) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) clock_nanosleep(0x3, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r5, r6, &(0x7f0000000240)=0x1ff, 0x4000000000dc) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f00000003c0)={0x8, 0x120, 0xfa00, {0x2, {0x0, 0x1, "4f3766563ef6736578e1c6232a707c28438aa19920949705a28c22d784445b9085ad2f009a9fb4bf043d4e3ab5e8f16b5ea457a6887d6aac7bb78b7d7d82fd7efafbd16683dac1a45249216b59ff09cb5cafe5f6eb3ab291b628f80bb0031187e3c954d2dbcdcff71d06577fb837697227bb66f8e2c0d11a15bc249d4075e600b6c571b444ce949e7aed4d4e7c112ffda5984346fb08336dbab55572e3a947adc6a23354afd63add8ec78c0b86613ed921aa25852a430f31805179bcbc28fd0eb1eeabb92b0c2d08fda018cd3e6a078890d9e567e225305424b55c04626cc21e700bfdab9c10f572aa55440c500a89d24d888c61edf73f4f5f149539fa98c683", 0x8, 0x9, 0x1f, 0x3f, 0x0, 0x1f, 0x3f}}}, 0x128) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:36:28 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:36:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) [ 1032.376490][ T1338] BPF:Invalid string section [ 1032.390691][ T1338] BPF:Invalid string section 16:36:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [], 0x3}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r5 = syz_open_dev$vcsn(0x0, 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) [ 1032.748146][ T27] audit: type=1400 audit(1581870988.955:116): avc: denied { accept } for pid=1342 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 1032.857747][ T1359] BPF:Invalid string section [ 1032.882973][ T1336] FAT-fs (loop1): Unrecognized mount option "discarh" or missing value [ 1032.897395][ T1359] BPF:Invalid string section 16:36:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [], 0x4}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) 16:36:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [], 0x5}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 1033.046997][ T1368] BPF:Invalid string section [ 1033.054306][ T1368] BPF:Invalid string section [ 1033.161571][ T1371] BPF:Invalid string section [ 1033.167224][ T1371] BPF:Invalid string section 16:36:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) process_vm_writev(r1, &(0x7f0000000540)=[{&(0x7f0000000240)=""/190, 0xbe}, {&(0x7f00000000c0)=""/94, 0x5e}, {&(0x7f0000000300)=""/210, 0xd2}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f0000000400)=""/119, 0x77}, {&(0x7f0000000480)=""/190, 0xbe}], 0x6, &(0x7f00000005c0), 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:36:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [], 0x6}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 1033.474003][ T1382] BPF:Invalid string section 16:36:29 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1033.516256][ T1382] BPF:Invalid string section 16:36:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [], 0x7}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) 16:36:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe7030007}, 0x1) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x210000, 0x0) setsockopt$SO_BINDTODEVICE_wg(r2, 0x1, 0x19, &(0x7f0000000100)='wg1\x00', 0x4) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_int(r1, 0x0, 0xe, &(0x7f0000001240), &(0x7f0000001280)=0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:36:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r5 = syz_open_dev$vcsn(0x0, 0x3ff, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1033.934647][ T1400] BPF:Invalid string section [ 1033.967892][ T1400] BPF:Invalid string section 16:36:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [], 0x8}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) [ 1034.241609][ T1409] BPF:Invalid string section [ 1034.300410][ T1409] BPF:Invalid string section 16:36:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [], 0xa}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900), 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:36:30 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1034.613763][ T1418] BPF:Invalid string section [ 1034.690424][ T1418] BPF:Invalid string section 16:36:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) 16:36:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r5 = syz_open_dev$vcsn(0x0, 0x0, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet6_dccp_int(r2, 0x21, 0xb, &(0x7f0000000100), &(0x7f0000000240)=0x4) poll(&(0x7f0000000180)=[{}], 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:36:31 executing program 1: syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0xf285, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18088}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000000c0)="d98a1cc112cfdac67e4f2c40c2b512c69bec7ed864da19f1fcbd6464a27e8a1b7ab15d892839c66ad19758b3b7b1a7fc9f7dbe3b1c12e9ee8d49868a483528d713b0e99b707bcb51d0d071e33a7ef00adfa6d287e5e688e70529", &(0x7f0000000240)=""/251}, 0x20) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900), 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:36:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [], 0x24}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 1035.047977][ T1440] BPF:Invalid string section [ 1035.080088][ T1440] BPF:Invalid string section 16:36:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) 16:36:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [], 0x30}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={r0}) r3 = socket$alg(0x26, 0x5, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r4, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r5, 0x0, 0x0) bind$alg(r5, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x43) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r3, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000480)={0x0, 0x0, 0x2, 0x0, [], [{0x3b2400, 0x2, 0x7, 0x1a34, 0x6a, 0x6}, {0x0, 0x8, 0x4, 0x3, 0xe7, 0xffffffffffffff7f}], [[], []]}) ioctl$SIOCX25SCALLUSERDATA(r2, 0x89e5, 0xffffffffffffffff) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0706", 0x3) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000300)='/dev/nvme-fabrics\x00', 0x20800, 0x0) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r8, 0x80000000}, &(0x7f0000000200)=0x8) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r6, 0xc008551c, &(0x7f0000000100)={0xdb3, 0x20, [0x4, 0x81, 0x9, 0xfffffffd, 0x8, 0x7, 0x1, 0xc00000]}) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000340)={r8, 0x80}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f00000003c0)={r9, 0x2, 0x8, 0x9, 0x1, 0x1}, 0x14) r10 = accept$alg(r0, 0x0, 0x0) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r11, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r12 = accept$alg(r11, 0x0, 0x0) sendmmsg$alg(r12, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r12, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002480)=""/4099, 0x1003}], 0x1, 0x0, 0x0, 0xe7030007}, 0x40002100) recvfrom(r12, &(0x7f0000000240)=""/99, 0x63, 0x10100, &(0x7f0000000400)=@rxrpc=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e21, @rand_addr=0x401}}, 0x80) ioperm(0x0, 0xfffffffffffffff7, 0x81) sendmmsg$alg(r10, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r10, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1035.385954][ T1451] BPF:Invalid string section [ 1035.422404][ T1451] BPF:Invalid string section 16:36:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [], 0x32}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) 16:36:31 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1035.809593][ T1461] BPF:Invalid string section [ 1035.845744][ T1461] BPF:Invalid string section 16:36:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r5 = syz_open_dev$vcsn(0x0, 0x0, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [], 0x48}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) 16:36:32 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000300)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, 0x0) mkdir(0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') [ 1036.139790][ T1479] BPF:Invalid string section [ 1036.162303][ T1479] BPF:Invalid string section 16:36:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [], 0x4c}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) clone(0x200, &(0x7f0000000240)="9ef3ca7e6936c2c21ae83e692634a07f396e0b11d96c43debea909f0f8ca1392392169018220f396c5fbe51a00896dc134537b43b423ecc8e6df73430eaae38504b425eb75baf8b9ca225bfcd31048aaf2f28f2d26a0a0e4c5ef98d70366e1a708fc169c8806d4d05644c575a66741a01a019ac6425ba766ba533b9a52524dee61ac4bb6d5c4da1ee6603cf43e3ebf7aae2bf4f3f06fbc447b89f57d082cab80fef5a847d8e07633b6e5b125ce", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000300)="9176bb9f1cad41c86095fc0e6e21c160764e9aff146d7c526145dd2797db0b16b824161908b52e06d4966f89584320c127d0ec9bc37fa1fe7394f483f847a41280878e66b2d70bb2c0b05e1edd01bb0b7e4582923f7769") bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(0xffffffffffffffff, 0x8080aea1, &(0x7f0000000380)) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r2, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x12103) 16:36:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) [ 1036.470370][ T1494] BPF:Invalid string section 16:36:32 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, 0x0) mkdir(0x0, 0x0) [ 1036.512251][ T1494] BPF:Invalid string section 16:36:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [], 0x60}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) 16:36:32 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1036.859737][ T1509] BPF:Invalid string section [ 1036.876817][ T1509] BPF:Invalid string section 16:36:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r5 = syz_open_dev$vcsn(0x0, 0x0, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [], 0x68}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:33 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, 0x0) mkdir(0x0, 0x0) rmdir(0x0) 16:36:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) [ 1037.201498][ T1526] BPF:Invalid string section [ 1037.217056][ T1526] BPF:Invalid string section 16:36:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [], 0x6c}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 1037.455323][ T1537] BPF:Invalid string section 16:36:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x1) [ 1037.487469][ T1537] BPF:Invalid string section 16:36:33 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f00000004c0)={0x0, 0x3, 0x4, 0x20000, 0xc638, {r2, r3/1000+10000}, {0x5, 0x0, 0x0, 0x2, 0x92, 0x5, "5f6eae25"}, 0x7fffffff, 0x3, @offset=0x7, 0x5, 0x0, r0}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000540)={{0x3, 0x0, @identifier="4b45a142f367cb7b6118aedac80610f4"}}) r5 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r5, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:36:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [], 0x74}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) [ 1037.746641][ T1547] BPF:Invalid string section [ 1037.775983][ T1547] BPF:Invalid string section 16:36:34 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:36:34 executing program 2: r0 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000005040), 0x15f, 0x0) 16:36:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) 16:36:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [], 0x7a}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r5 = syz_open_dev$vcsn(0x0, 0x0, 0x0) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1038.080103][ T1557] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1038.129505][ T1560] BPF:Invalid string section [ 1038.140155][ T1560] BPF:Invalid string section 16:36:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [], 0xd1}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 16:36:34 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000180)) r0 = syz_open_dev$vcsn(0x0, 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x1) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'batadv_slave_0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000640)={@mcast1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) dup(0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x40000000000024a, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x4000021) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='com.apple.system.Security\x00', &(0x7f00000001c0)='keyring\x00', 0x8, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$FICLONERANGE(r2, 0x4020940d, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) r3 = gettid() tkill(r3, 0x29) [ 1038.402896][ T1571] BPF:Invalid string section [ 1038.441840][ T1571] BPF:Invalid string section 16:36:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x7, 0xd2, 0x8}, 0x20) 16:36:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) [ 1038.704914][ T1580] BPF:hdr_len not found 16:36:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1038.736500][ T1580] BPF:hdr_len not found 16:36:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x18, 0xd2, 0x8}, 0x20) 16:36:35 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:36:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) 16:36:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r5 = syz_open_dev$vcsn(0x0, 0x0, 0x0) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1039.142814][ T1595] BPF:No data [ 1039.177135][ T1595] BPF:No data 16:36:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4b, 0xd2, 0x8}, 0x20) [ 1039.504828][ T1606] BPF:Unsupported section found [ 1039.534327][ T1606] BPF:Unsupported section found 16:36:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) 16:36:35 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x3000000, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x10}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:36:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x1000000, 0xd2, 0x8}, 0x20) 16:36:36 executing program 1: r0 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, r0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@op], 0xe0}], 0x0, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(r1, 0x0, 0x0, 0x80800) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r7, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010003b0dfff300"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r7, @ANYBLOB="140012000b000100627269646765000004000200"], 0x3c}}, 0x6000000) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r8, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) bind$xdp(r3, &(0x7f00000000c0)={0x2c, 0x8, r7, 0x0, r8}, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1039.894344][ T1616] netlink: 'syz-executor.2': attribute type 16 has an invalid length. [ 1039.932624][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 16:36:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) 16:36:36 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1040.320339][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1040.426138][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1040.450599][ T1616] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 16:36:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r5 = syz_open_dev$vcsn(0x0, 0x0, 0x0) r6 = accept4$alg(r5, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:36 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x3000000, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x10}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 1040.645459][ T1628] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 16:36:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x2000458a, 0xd2, 0x8}, 0x20) [ 1040.774917][ T1631] bond1: (slave bridge1): making interface the new active one [ 1040.804132][ T1631] bond1: (slave bridge1): Enslaving as an active interface with an up link 16:36:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0x63, 0x8}, 0x20) 16:36:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x10}, 0x20) [ 1041.032221][ T1631] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 16:36:37 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1041.102525][ T1628] bond1: (slave bridge2): Enslaving as an active interface with a down link [ 1041.115489][ T1652] netlink: 'syz-executor.2': attribute type 16 has an invalid length. 16:36:37 executing program 1: clone3(&(0x7f0000000380)={0x60000000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000180), {0x36}, &(0x7f0000000240)=""/88, 0x58, &(0x7f00000002c0)=""/76, &(0x7f0000000340)=[0xffffffffffffffff], 0x1}, 0x50) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000000000, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000480)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1041.190882][ T1652] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 16:36:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x1d}, 0x20) 16:36:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x2f}, 0x20) [ 1041.475980][ T1665] IPVS: ftp: loaded support on port[0] = 21 [ 1041.587298][ T1652] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 16:36:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x34}, 0x20) [ 1041.719133][ T1652] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1041.746757][ T1652] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 16:36:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) 16:36:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x141a02) r5 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r5}], 0x1, 0x0) r6 = accept$alg(r4, 0x0, 0x0) recvmsg(r6, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:38 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:36:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000000)={0x0, 0x1ff}) 16:36:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x36}, 0x20) 16:36:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x4b}, 0x20) 16:36:38 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1042.493230][ T1671] IPVS: ftp: loaded support on port[0] = 21 16:36:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7}}) read(r2, &(0x7f0000000000)=""/42, 0x4) [ 1042.619689][T13486] tipc: TX() has been purged, node left! 16:36:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x24000, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r2, 0x8004500b, &(0x7f0000000100)=0x9) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x40000, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r4, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) accept$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14) connect$packet(r3, &(0x7f00000002c0)={0x11, 0x329b8d0e92e09eee, r5, 0x1, 0xab, 0x6, @remote}, 0x14) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 16:36:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7}}) read(r2, &(0x7f0000000000)=""/42, 0x4) 16:36:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) 16:36:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x3d0}, 0x20) 16:36:42 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:36:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x141a02) r5 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r5}], 0x1, 0x0) r6 = accept$alg(r4, 0x0, 0x0) recvmsg(r6, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0xa) 16:36:42 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:36:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x25) [ 1046.587316][ T1742] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 1046.598162][ T1742] BPF: [ 1046.601987][ T1742] BPF:Member exceeds struct_size [ 1046.607808][ T1742] BPF: [ 1046.607808][ T1742] 16:36:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x141a02) r5 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) poll(&(0x7f0000000180)=[{r5}], 0x1, 0x0) r6 = accept$alg(r4, 0x0, 0x0) recvmsg(r6, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1046.637843][ T1742] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 1046.659988][ T1742] BPF: [ 1046.666018][ T1742] BPF:Member exceeds struct_size [ 1046.708098][ T1742] BPF: [ 1046.708098][ T1742] 16:36:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x2f) 16:36:43 executing program 1: r0 = socket(0x2, 0x803, 0xff) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f00000005c0)={0x2, 0x0, @local}, 0x10, 0x0}}, {{&(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="10000000000000000000000007000000461cbee4c98a7baa4013ab995aac5a3a"], 0x20}}], 0x2, 0x48854) [ 1046.906773][ T1748] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 1046.921129][ T1748] BPF: [ 1046.927954][ T1748] BPF:Member exceeds struct_size [ 1046.940758][ T1748] BPF: [ 1046.940758][ T1748] 16:36:43 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1046.974301][ T1748] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 1047.009009][ T1748] BPF: [ 1047.011918][ T1748] BPF:Member exceeds struct_size [ 1047.017077][ T1748] BPF: [ 1047.017077][ T1748] 16:36:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7}}) read(r2, &(0x7f0000000000)=""/42, 0x4) 16:36:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) 16:36:43 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x3000000, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x10}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 16:36:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x34) 16:36:43 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1047.429854][ T1763] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 1047.442603][ T1762] netlink: 'syz-executor.1': attribute type 16 has an invalid length. [ 1047.463629][ T1763] BPF: 16:36:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) [ 1047.478589][ T1763] BPF:Member exceeds struct_size [ 1047.538393][ T1762] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1047.549159][ T1763] BPF: [ 1047.549159][ T1763] [ 1047.572760][ T1763] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 1047.600457][ T1762] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1047.608571][ T1763] BPF: [ 1047.627907][ T1763] BPF:Member exceeds struct_size [ 1047.637014][ T1762] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1047.646537][ T1763] BPF: 16:36:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r5 = syz_open_dev$vcsn(0x0, 0x0, 0x141a02) r6 = accept4$alg(r5, 0x0, 0x0, 0x0) poll(&(0x7f0000000180)=[{r6}], 0x1, 0x0) r7 = accept$alg(r4, 0x0, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1047.646537][ T1763] 16:36:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x36) 16:36:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) 16:36:44 executing program 1: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xef}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x173) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r3) socket$inet_tcp(0x2, 0x1, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) listxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r5, r5) clone3(0x0, 0x0) r6 = clone3(&(0x7f0000000680)={0x4087500, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x50) rt_sigqueueinfo(r6, 0x1d, &(0x7f0000000280)={0x28, 0x0, 0x80000000}) socket$inet_tcp(0x2, 0x1, 0x0) [ 1047.870862][ T1788] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 1047.916117][ T1788] BPF: [ 1047.929222][ T1788] BPF:Member exceeds struct_size [ 1047.958392][ T1788] BPF: [ 1047.958392][ T1788] [ 1048.031282][ T1788] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 1048.042401][ T1788] BPF: [ 1048.049489][ T1788] BPF:Member exceeds struct_size [ 1048.062622][ C1] sd 0:0:1:0: [sg0] tag#4118 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1048.073759][ C1] sd 0:0:1:0: [sg0] tag#4118 CDB: Test Unit Ready [ 1048.080857][ C1] sd 0:0:1:0: [sg0] tag#4118 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.090664][ C1] sd 0:0:1:0: [sg0] tag#4118 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.101386][ C1] sd 0:0:1:0: [sg0] tag#4118 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.109196][ T1788] BPF: [ 1048.109196][ T1788] [ 1048.111498][ C1] sd 0:0:1:0: [sg0] tag#4118 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.126414][ C1] sd 0:0:1:0: [sg0] tag#4118 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.136339][ C1] sd 0:0:1:0: [sg0] tag#4118 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.146305][ C1] sd 0:0:1:0: [sg0] tag#4118 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.156190][ C1] sd 0:0:1:0: [sg0] tag#4118 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.166038][ C1] sd 0:0:1:0: [sg0] tag#4118 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.176307][ C1] sd 0:0:1:0: [sg0] tag#4118 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.185968][ C1] sd 0:0:1:0: [sg0] tag#4118 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.196145][ C1] sd 0:0:1:0: [sg0] tag#4118 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.206025][ C1] sd 0:0:1:0: [sg0] tag#4118 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.216344][ C1] sd 0:0:1:0: [sg0] tag#4118 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.226461][ C1] sd 0:0:1:0: [sg0] tag#4118 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 16:36:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x4b) [ 1048.431619][ T1801] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 1048.447359][ T1801] BPF: [ 1048.462460][ T1801] BPF:Member exceeds struct_size [ 1048.474713][ C1] sd 0:0:1:0: [sg0] tag#4119 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1048.479417][ T1801] BPF: [ 1048.479417][ T1801] [ 1048.485645][ C1] sd 0:0:1:0: [sg0] tag#4119 CDB: Test Unit Ready [ 1048.497426][ C1] sd 0:0:1:0: [sg0] tag#4119 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.507200][ C1] sd 0:0:1:0: [sg0] tag#4119 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.516856][ C1] sd 0:0:1:0: [sg0] tag#4119 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.522721][ T1801] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 1048.526707][ C1] sd 0:0:1:0: [sg0] tag#4119 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.544614][ C1] sd 0:0:1:0: [sg0] tag#4119 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.554548][ C1] sd 0:0:1:0: [sg0] tag#4119 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.558744][ T1801] BPF: [ 1048.564423][ C1] sd 0:0:1:0: [sg0] tag#4119 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16:36:44 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1048.564448][ C1] sd 0:0:1:0: [sg0] tag#4119 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.564471][ C1] sd 0:0:1:0: [sg0] tag#4119 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.564492][ C1] sd 0:0:1:0: [sg0] tag#4119 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.564515][ C1] sd 0:0:1:0: [sg0] tag#4119 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.564539][ C1] sd 0:0:1:0: [sg0] tag#4119 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.564563][ C1] sd 0:0:1:0: [sg0] tag#4119 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.564586][ C1] sd 0:0:1:0: [sg0] tag#4119 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.564608][ C1] sd 0:0:1:0: [sg0] tag#4119 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 [ 1048.595514][ T1801] BPF:Member exceeds struct_size [ 1048.780918][ T1801] BPF: [ 1048.780918][ T1801] 16:36:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x424182, 0x0) ioctl$USBDEVFS_CONNECTINFO(0xffffffffffffffff, 0x40085511, &(0x7f0000000040)) r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000a40), 0x8000000000000b0, 0x101d0) 16:36:45 executing program 1: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xef}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x173) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r3) socket$inet_tcp(0x2, 0x1, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) listxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r5, r5) clone3(0x0, 0x0) r6 = clone3(&(0x7f0000000680)={0x4087500, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x50) rt_sigqueueinfo(r6, 0x1d, &(0x7f0000000280)={0x28, 0x0, 0x80000000}) socket$inet_tcp(0x2, 0x1, 0x0) 16:36:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) 16:36:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r5 = syz_open_dev$vcsn(0x0, 0x0, 0x141a02) accept4$alg(r5, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) r6 = accept$alg(r4, 0x0, 0x0) recvmsg(r6, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x60) [ 1049.013548][ T1821] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 1049.049194][ T1821] BPF: [ 1049.050357][ C0] sd 0:0:1:0: [sg0] tag#4120 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1049.055716][ T1821] BPF:Member exceeds struct_size [ 1049.063076][ C0] sd 0:0:1:0: [sg0] tag#4120 CDB: Test Unit Ready [ 1049.063103][ C0] sd 0:0:1:0: [sg0] tag#4120 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1049.063127][ C0] sd 0:0:1:0: [sg0] tag#4120 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1049.063151][ C0] sd 0:0:1:0: [sg0] tag#4120 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1049.063176][ C0] sd 0:0:1:0: [sg0] tag#4120 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1049.114832][ C0] sd 0:0:1:0: [sg0] tag#4120 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1049.124987][ C0] sd 0:0:1:0: [sg0] tag#4120 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1049.134761][ C0] sd 0:0:1:0: [sg0] tag#4120 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1049.144827][ C0] sd 0:0:1:0: [sg0] tag#4120 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1049.147242][ T1821] BPF: [ 1049.147242][ T1821] [ 1049.154625][ C0] sd 0:0:1:0: [sg0] tag#4120 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1049.154651][ C0] sd 0:0:1:0: [sg0] tag#4120 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1049.154677][ C0] sd 0:0:1:0: [sg0] tag#4120 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1049.154702][ C0] sd 0:0:1:0: [sg0] tag#4120 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1049.154725][ C0] sd 0:0:1:0: [sg0] tag#4120 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1049.154748][ C0] sd 0:0:1:0: [sg0] tag#4120 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1049.218659][ C0] sd 0:0:1:0: [sg0] tag#4120 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 [ 1049.252437][ T1821] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 16:36:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x78) [ 1049.292125][ T1821] BPF: [ 1049.295351][ T1821] BPF:Member exceeds struct_size [ 1049.301102][ T1821] BPF: [ 1049.301102][ T1821] 16:36:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) 16:36:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa10000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3b}], 0x3, 0x0, 0x0, 0x3b2) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1049.416736][ T1834] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 1049.440042][ T1834] BPF: [ 1049.446723][ T1834] BPF:Member exceeds struct_size [ 1049.456692][ T1834] BPF: [ 1049.456692][ T1834] [ 1049.473734][ T1834] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 1049.489968][ T1834] BPF: [ 1049.513708][ T1834] BPF:Member exceeds struct_size [ 1049.559656][ T1834] BPF: [ 1049.559656][ T1834] 16:36:45 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:36:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20000020) 16:36:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) 16:36:46 executing program 1: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xef}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x178) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) listxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r7, r7, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r8, r8) clone3(0x0, 0x0) r9 = clone3(&(0x7f0000000680)={0x4087500, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x50) rt_sigqueueinfo(r9, 0x1d, &(0x7f0000000280)={0x28, 0x0, 0x80000000}) socket$inet_tcp(0x2, 0x1, 0x0) 16:36:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r5 = syz_open_dev$vcsn(0x0, 0x0, 0x141a02) accept4$alg(r5, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) r6 = accept$alg(r4, 0x0, 0x0) recvmsg(r6, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:46 executing program 2: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xef}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_open_dev$sg(0x0, 0x0, 0x5) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setregid(0x0, 0x0) clone3(0x0, 0x0) clone3(&(0x7f0000000680)={0x4087500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x50) rt_sigqueueinfo(0x0, 0x1d, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) 16:36:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x7, 0xd9}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2, 0x100}}, @struct={0x0, 0x15555555555557e7, 0x0, 0x4, 0x1}]}}, &(0x7f0000004600)=""/210, 0x56, 0xfffffffffffffc8e, 0x8}, 0x20) [ 1050.082319][ C1] sd 0:0:1:0: [sg0] tag#4125 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1050.093140][ C1] sd 0:0:1:0: [sg0] tag#4125 CDB: Test Unit Ready [ 1050.099769][ C1] sd 0:0:1:0: [sg0] tag#4125 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.109658][ C1] sd 0:0:1:0: [sg0] tag#4125 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.120006][ C1] sd 0:0:1:0: [sg0] tag#4125 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.129679][ C1] sd 0:0:1:0: [sg0] tag#4125 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.139707][ C1] sd 0:0:1:0: [sg0] tag#4125 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.149620][ C1] sd 0:0:1:0: [sg0] tag#4125 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.160068][ C1] sd 0:0:1:0: [sg0] tag#4125 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.170291][ C1] sd 0:0:1:0: [sg0] tag#4125 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.180536][ C1] sd 0:0:1:0: [sg0] tag#4125 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.191747][ C1] sd 0:0:1:0: [sg0] tag#4125 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.201941][ C1] sd 0:0:1:0: [sg0] tag#4125 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.212048][ C1] sd 0:0:1:0: [sg0] tag#4125 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.221837][ C1] sd 0:0:1:0: [sg0] tag#4125 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.231765][ C1] sd 0:0:1:0: [sg0] tag#4125 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.241676][ C1] sd 0:0:1:0: [sg0] tag#4125 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 16:36:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) 16:36:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000040)) 16:36:46 executing program 2: pipe(0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000000}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x9) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) open(&(0x7f00000005c0)='./file0\x00', 0x200c2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{0x0}], 0x1}, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000600)=ANY=[@ANYRES16=r0], 0x1}, 0x1, 0x0, 0x0, 0x8044}, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept(r1, 0x0, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) dup(0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r3, 0x57ba0925e812502b, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0x4004) [ 1050.401111][ C0] sd 0:0:1:0: [sg0] tag#4126 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1050.411730][ C0] sd 0:0:1:0: [sg0] tag#4126 CDB: Test Unit Ready [ 1050.418442][ C0] sd 0:0:1:0: [sg0] tag#4126 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.428510][ C0] sd 0:0:1:0: [sg0] tag#4126 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.438548][ C0] sd 0:0:1:0: [sg0] tag#4126 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.448503][ C0] sd 0:0:1:0: [sg0] tag#4126 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.458639][ C0] sd 0:0:1:0: [sg0] tag#4126 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.460328][ T1882] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 1050.468567][ C0] sd 0:0:1:0: [sg0] tag#4126 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.485350][ C0] sd 0:0:1:0: [sg0] tag#4126 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.495660][ C0] sd 0:0:1:0: [sg0] tag#4126 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.505542][ C0] sd 0:0:1:0: [sg0] tag#4126 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.511773][ T1882] BPF: [ 1050.515401][ C0] sd 0:0:1:0: [sg0] tag#4126 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.527951][ C0] sd 0:0:1:0: [sg0] tag#4126 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.538116][ C0] sd 0:0:1:0: [sg0] tag#4126 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.542468][ T1882] BPF:Member exceeds struct_size [ 1050.548126][ C0] sd 0:0:1:0: [sg0] tag#4126 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.562959][ C0] sd 0:0:1:0: [sg0] tag#4126 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1050.564238][ T1882] BPF: [ 1050.564238][ T1882] [ 1050.572670][ C0] sd 0:0:1:0: [sg0] tag#4126 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 16:36:46 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1050.659771][ T1882] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 1050.691650][ T1882] BPF: [ 1050.695863][ T1882] BPF:Member exceeds struct_size 16:36:46 executing program 2: pipe(0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000000}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x9) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) open(&(0x7f00000005c0)='./file0\x00', 0x200c2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{0x0}], 0x1}, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000600)=ANY=[@ANYRES16=r0], 0x1}, 0x1, 0x0, 0x0, 0x8044}, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept(r1, 0x0, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) dup(0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r3, 0x57ba0925e812502b, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0x4004) [ 1050.725441][ T1882] BPF: [ 1050.725441][ T1882] 16:36:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r5 = accept$alg(r4, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r5, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r6, 0x0, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r7, 0x0, 0x0) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r8, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r8, 0x0, 0x0) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r9, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRES32=0x0, @ANYRES16, @ANYRES64, @ANYRESOCT=r9, @ANYPTR64, @ANYRESHEX], &(0x7f0000004600)=""/210, 0x41, 0xd2, 0x8}, 0x79) 16:36:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) 16:36:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r5 = syz_open_dev$vcsn(0x0, 0x0, 0x141a02) accept4$alg(r5, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) r6 = accept$alg(r4, 0x0, 0x0) recvmsg(r6, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) 16:36:47 executing program 1: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xef}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x178) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) listxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r7, r7, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r8, r8) clone3(0x0, 0x0) r9 = clone3(&(0x7f0000000680)={0x4087500, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x50) rt_sigqueueinfo(r9, 0x1d, &(0x7f0000000280)={0x28, 0x0, 0x80000000}) socket$inet_tcp(0x2, 0x1, 0x0) 16:36:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) 16:36:47 executing program 2: pipe(0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x9) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x17a) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet(0x10, 0x3, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000600)=ANY=[@ANYBLOB="2e56d61719922bebfcc21c2fea464c03e6c89fae20fc2f681369b98dc8dc3b17133dc46c044980db8eaf103c22b89cefbbf3d6f05019f5d4651f7bfa5a236480037006c1e12b210ae4c5a8f3ae68cd53131ff43e9a3e6ce3e50bdf37da5f", @ANYRES16=r1, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x8044}, 0x1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x7a10}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r5, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10081}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xc0, 0x0, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x34}, @IPVS_CMD_ATTR_SERVICE={0x48}, @IPVS_CMD_ATTR_DAEMON={0x30}]}, 0xc0}, 0x1, 0x0, 0x0, 0x180}, 0x20040840) close(0xffffffffffffffff) [ 1051.371966][ C0] sd 0:0:1:0: [sg0] tag#4127 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1051.384533][ C0] sd 0:0:1:0: [sg0] tag#4127 CDB: Test Unit Ready [ 1051.391328][ C0] sd 0:0:1:0: [sg0] tag#4127 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.401218][ C0] sd 0:0:1:0: [sg0] tag#4127 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.411045][ C0] sd 0:0:1:0: [sg0] tag#4127 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.420974][ C0] sd 0:0:1:0: [sg0] tag#4127 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.430699][ C0] sd 0:0:1:0: [sg0] tag#4127 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.440421][ C0] sd 0:0:1:0: [sg0] tag#4127 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.451300][ C0] sd 0:0:1:0: [sg0] tag#4127 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.461471][ C0] sd 0:0:1:0: [sg0] tag#4127 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.471376][ C0] sd 0:0:1:0: [sg0] tag#4127 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.481231][ C0] sd 0:0:1:0: [sg0] tag#4127 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.491730][ C0] sd 0:0:1:0: [sg0] tag#4127 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.501360][ C0] sd 0:0:1:0: [sg0] tag#4127 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.511000][ C0] sd 0:0:1:0: [sg0] tag#4127 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.520897][ C0] sd 0:0:1:0: [sg0] tag#4127 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.531376][ C0] sd 0:0:1:0: [sg0] tag#4127 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.568656][ C1] sd 0:0:1:0: [sg0] tag#4128 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1051.579496][ C1] sd 0:0:1:0: [sg0] tag#4128 CDB: Test Unit Ready [ 1051.586352][ C1] sd 0:0:1:0: [sg0] tag#4128 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.596127][ C1] sd 0:0:1:0: [sg0] tag#4128 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.606155][ C1] sd 0:0:1:0: [sg0] tag#4128 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.615985][ C1] sd 0:0:1:0: [sg0] tag#4128 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.626689][ C1] sd 0:0:1:0: [sg0] tag#4128 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.636778][ C1] sd 0:0:1:0: [sg0] tag#4128 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.646531][ C1] sd 0:0:1:0: [sg0] tag#4128 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.656675][ C1] sd 0:0:1:0: [sg0] tag#4128 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.666544][ C1] sd 0:0:1:0: [sg0] tag#4128 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.676430][ C1] sd 0:0:1:0: [sg0] tag#4128 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.686413][ C1] sd 0:0:1:0: [sg0] tag#4128 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.696195][ C1] sd 0:0:1:0: [sg0] tag#4128 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.706377][ C1] sd 0:0:1:0: [sg0] tag#4128 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16:36:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) [ 1051.716268][ C1] sd 0:0:1:0: [sg0] tag#4128 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.726409][ C1] sd 0:0:1:0: [sg0] tag#4128 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 16:36:48 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") 16:36:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r5 = syz_open_dev$vcsn(0x0, 0x0, 0x141a02) accept4$alg(r5, 0x0, 0x0, 0x0) poll(&(0x7f0000000180), 0x0, 0x0) r6 = accept$alg(r4, 0x0, 0x0) recvmsg(r6, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1051.902823][ C0] sd 0:0:1:0: [sg0] tag#4129 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1051.913762][ C0] sd 0:0:1:0: [sg0] tag#4129 CDB: Test Unit Ready [ 1051.920284][ C0] sd 0:0:1:0: [sg0] tag#4129 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.930206][ C0] sd 0:0:1:0: [sg0] tag#4129 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.940118][ C0] sd 0:0:1:0: [sg0] tag#4129 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.951463][ C0] sd 0:0:1:0: [sg0] tag#4129 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.961445][ C0] sd 0:0:1:0: [sg0] tag#4129 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.971121][ C0] sd 0:0:1:0: [sg0] tag#4129 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.980933][ C0] sd 0:0:1:0: [sg0] tag#4129 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1051.991140][ C0] sd 0:0:1:0: [sg0] tag#4129 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1052.001356][ C0] sd 0:0:1:0: [sg0] tag#4129 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1052.011206][ C0] sd 0:0:1:0: [sg0] tag#4129 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1052.021441][ C0] sd 0:0:1:0: [sg0] tag#4129 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1052.031460][ C0] sd 0:0:1:0: [sg0] tag#4129 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1052.041404][ C0] sd 0:0:1:0: [sg0] tag#4129 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1052.051427][ C0] sd 0:0:1:0: [sg0] tag#4129 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1052.061826][ C0] sd 0:0:1:0: [sg0] tag#4129 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 16:36:48 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 16:36:48 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x3d, 0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000740)={0x3, 0x0, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000480)={0x3, 0x0, [{0xff, 0x0, 0xe316}, {0x8}, {0x81}]}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x4e20, @dev}, 0xfffffffffffffe0e) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) open(0x0, 0x0, 0x0) 16:36:48 executing program 5: times(&(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r0, r1, &(0x7f0000000240)=0x202, 0x4000000000dc) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x13) 16:36:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05140000000000000000010000000900010073797a30000000006c000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000400003802c000380140001006c6f000005000000004000000000000014000100736974300000000000000000000000000800024000000000080001400000000040000000020a010300000000000000000a0000070c00044000000000000000050c00044000000000000000040900010073797a31000000000800024000000003140000001100010000000000000000000000000af2"], 0xf4}}, 0x0) [ 1052.407502][ T1976] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 1052.458195][ T1976] BPF: [ 1052.492176][ T1976] BPF:Member exceeds struct_size [ 1052.522385][ T1976] BPF: [ 1052.522385][ T1976] 16:36:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() gettid() r1 = gettid() r2 = gettid() r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x20000000000000, 0x0) clone3(&(0x7f00000001c0)={0x8020000, &(0x7f00000002c0), &(0x7f0000000540), &(0x7f0000000580), {0x25}, 0x0, 0x0, &(0x7f0000001600)=""/133, &(0x7f00000016c0)=[r1, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, r2, r3], 0x7}, 0x50) wait4(0x0, 0x0, 0x8, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$P9_RAUTH(r4, &(0x7f00000000c0)={0x14, 0x67, 0x2, {0x10, 0x0, 0x3}}, 0x14) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1052.587453][ T1976] BPF: (anon) type_id=1 bitfield_size=0 bits_offset=0 [ 1052.629067][ T1983] general protection fault, probably for non-canonical address 0xdffffc00060e8d2f: 0000 [#1] PREEMPT SMP KASAN [ 1052.630600][ T1976] BPF: [ 1052.641007][ T1983] KASAN: probably user-memory-access in range [0x0000000030746978-0x000000003074697f] [ 1052.641025][ T1983] CPU: 1 PID: 1983 Comm: syz-executor.1 Not tainted 5.6.0-rc1-syzkaller #0 [ 1052.641033][ T1983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1052.641069][ T1983] RIP: 0010:nf_flow_table_offload_setup+0x4dc/0x6d0 [ 1052.641087][ T1983] Code: bc 24 50 ff ff ff 48 ba 00 00 00 00 00 fc ff df 4d 8b ae 00 02 00 00 4d 8b a4 24 58 ff ff ff 49 8d 7f 08 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 cd 01 00 00 4c 89 e2 49 89 47 08 48 b8 00 00 00 [ 1052.641093][ T1983] RSP: 0018:ffffc90002ee7228 EFLAGS: 00010202 [ 1052.641105][ T1983] RAX: ffff88804a819250 RBX: 1ffff920005dce49 RCX: 00000000060e8d2f [ 1052.641114][ T1983] RDX: dffffc0000000000 RSI: ffffffff8687b96e RDI: 000000003074697b [ 1052.641122][ T1983] RBP: ffffc90002ee7370 R08: ffff88804f016500 R09: fffff520005dce55 [ 1052.641130][ T1983] R10: fffff520005dce54 R11: ffffc90002ee72a6 R12: 0000000000000000 [ 1052.641137][ T1983] R13: ffff88804a819250 R14: ffff88804a819050 R15: 0000000030746973 [ 1052.641147][ T1983] FS: 00007f18ab80a700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1052.641153][ T1983] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1052.641161][ T1983] CR2: 00007fedc5a22000 CR3: 00000000888a1000 CR4: 00000000001406e0 [ 1052.641171][ T1983] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1052.641185][ T1983] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1052.641189][ T1983] Call Trace: [ 1052.641214][ T1983] ? flow_offload_queue_work+0x130/0x130 [ 1052.641233][ T1983] ? nft_netdev_hook_alloc+0xfb/0x170 [ 1052.641246][ T1983] ? nf_tables_init_net+0x1e0/0x1e0 [ 1052.641272][ T1983] ? nla_memcpy+0xb0/0xb0 [ 1052.662560][ T1976] BPF:Member exceeds struct_size [ 1052.663168][ T1983] ? wait_for_completion+0x440/0x440 [ 1052.663196][ T1983] ? nf_tables_parse_netdev_hooks+0x70/0x660 [ 1052.689239][ T1976] BPF: [ 1052.689239][ T1976] [ 1052.699490][ T1983] nf_tables_newflowtable+0x1352/0x1d90 [ 1052.699520][ T1983] ? nf_tables_newrule+0x2400/0x2400 [ 1052.699547][ T1983] ? __nla_parse+0x43/0x60 [ 1052.699566][ T1983] nfnetlink_rcv_batch+0x8c8/0x1790 [ 1052.699590][ T1983] ? nf_tables_newrule+0x2400/0x2400 [ 1052.856473][ T1983] ? nfnetlink_subsys_register+0x2b0/0x2b0 [ 1052.862323][ T1983] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 1052.867990][ T1983] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1052.874269][ T1983] ? __nla_validate_parse+0x2d0/0x1ee0 [ 1052.879889][ T1983] ? selinux_capable+0x36/0x40 [ 1052.884686][ T1983] ? nla_memcpy+0xb0/0xb0 [ 1052.889039][ T1983] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1052.895443][ T1983] ? ns_capable_common+0x93/0x100 [ 1052.900503][ T1983] ? __nla_parse+0x43/0x60 [ 1052.905061][ T1983] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1052.910819][ T1983] nfnetlink_rcv+0x3e7/0x460 [ 1052.915435][ T1983] ? nfnetlink_rcv_batch+0x1790/0x1790 [ 1052.920930][ T1983] ? netlink_deliver_tap+0x248/0xbf0 [ 1052.926430][ T1983] netlink_unicast+0x59e/0x7e0 [ 1052.931247][ T1983] ? netlink_attachskb+0x870/0x870 [ 1052.936400][ T1983] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1052.942670][ T1983] netlink_sendmsg+0x91c/0xea0 [ 1052.947457][ T1983] ? netlink_unicast+0x7e0/0x7e0 [ 1052.952410][ T1983] ? tomoyo_socket_sendmsg+0x26/0x30 [ 1052.957723][ T1983] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1052.963984][ T1983] ? security_socket_sendmsg+0x8d/0xc0 [ 1052.969463][ T1983] ? netlink_unicast+0x7e0/0x7e0 [ 1052.974423][ T1983] sock_sendmsg+0xd7/0x130 [ 1052.978861][ T1983] ____sys_sendmsg+0x753/0x880 [ 1052.983751][ T1983] ? kernel_sendmsg+0x50/0x50 [ 1052.989525][ T1983] ? __fget_files+0x337/0x520 [ 1052.994229][ T1983] ? find_held_lock+0x35/0x130 [ 1052.999207][ T1983] ___sys_sendmsg+0x100/0x170 [ 1053.003919][ T1983] ? sendmsg_copy_msghdr+0x70/0x70 [ 1053.009189][ T1983] ? __kasan_check_read+0x11/0x20 [ 1053.014244][ T1983] ? __fget_files+0x359/0x520 [ 1053.018950][ T1983] ? ksys_dup3+0x3e0/0x3e0 [ 1053.023415][ T1983] ? __fget_light+0x1ad/0x270 [ 1053.028228][ T1983] ? __fdget+0x1b/0x20 [ 1053.032377][ T1983] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1053.038641][ T1983] __sys_sendmsg+0x105/0x1d0 [ 1053.043288][ T1983] ? __sys_sendmsg_sock+0xc0/0xc0 [ 1053.048376][ T1983] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1053.053856][ T1983] ? do_syscall_64+0x26/0x790 [ 1053.058551][ T1983] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1053.064643][ T1983] ? do_syscall_64+0x26/0x790 [ 1053.069370][ T1983] __x64_sys_sendmsg+0x78/0xb0 [ 1053.074163][ T1983] do_syscall_64+0xfa/0x790 [ 1053.078697][ T1983] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1053.084603][ T1983] RIP: 0033:0x45c6c9 [ 1053.088515][ T1983] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1053.108819][ T1983] RSP: 002b:00007f18ab809c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1053.117371][ T1983] RAX: ffffffffffffffda RBX: 00007f18ab80a6d4 RCX: 000000000045c6c9 16:36:49 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000200003) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x500, 0x0, 0x54, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x4, 0x500000000000000]}}}, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") [ 1053.125370][ T1983] RDX: 0000000000000000 RSI: 0000000020003e00 RDI: 0000000000000003 [ 1053.133357][ T1983] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1053.141452][ T1983] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1053.149965][ T1983] R13: 0000000000000946 R14: 00000000004cbdc6 R15: 000000000076bf2c [ 1053.157957][ T1983] Modules linked in: 16:36:49 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001300)='/dev/bsg\x00', 0x900, 0x0) setsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000001340)=0x1, 0x4) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x4, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000200000005001f0000000006040000000000000000000009010000000000000001000084000000000e00000002000000e0d5ffff0000"], &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) r1 = socket$inet6(0xa, 0x3, 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) accept$alg(r3, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000100)={0x9d0000, 0x97a, 0x5, r3, 0x0, &(0x7f00000000c0)={0xa10001, 0x8, [], @p_u16=&(0x7f0000000080)=0x3ff}}) 16:36:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e1ead886ee8abb0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x60, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x30, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}, @TCA_CGROUP_ACT={0x1c, 0x1, [@m_vlan={0x18, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x60}}, 0x0) [ 1053.192534][ T1983] ---[ end trace 91073827a1071eec ]--- [ 1053.198422][ T1983] RIP: 0010:nf_flow_table_offload_setup+0x4dc/0x6d0 [ 1053.205151][ T1983] Code: bc 24 50 ff ff ff 48 ba 00 00 00 00 00 fc ff df 4d 8b ae 00 02 00 00 4d 8b a4 24 58 ff ff ff 49 8d 7f 08 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 cd 01 00 00 4c 89 e2 49 89 47 08 48 b8 00 00 00 16:36:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb700000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000200)="0a0775e5b3e4ddbfcb54dbb70000", 0xe) r3 = accept$alg(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xe7030007}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r5 = syz_open_dev$vcsn(0x0, 0x0, 0x141a02) accept4$alg(r5, 0x0, 0x0, 0x0) poll(&(0x7f0000000180), 0x0, 0x0) r6 = accept$alg(r4, 0x0, 0x0) recvmsg(r6, &(0x7f0000000000)={0x0, 0xe7030002, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x8, 0x0, 0x200e703, 0xe7030007}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1053.255983][ T1983] RSP: 0018:ffffc90002ee7228 EFLAGS: 00010202 [ 1053.307369][ T1999] BPF:[1] Invalid name_offset:2031621 [ 1053.324083][ T1983] RAX: ffff88804a819250 RBX: 1ffff920005dce49 RCX: 00000000060e8d2f [ 1053.339432][ T1983] RDX: dffffc0000000000 RSI: ffffffff8687b96e RDI: 000000003074697b [ 1053.356524][ T1999] BPF:[1] Invalid name_offset:2031621 [ 1053.361045][ T1983] RBP: ffffc90002ee7370 R08: ffff88804f016500 R09: fffff520005dce55 16:36:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() gettid() r1 = gettid() r2 = gettid() r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x20000000000000, 0x0) clone3(&(0x7f00000001c0)={0x8020000, &(0x7f00000002c0), &(0x7f0000000540), &(0x7f0000000580), {0x25}, 0x0, 0x0, &(0x7f0000001600)=""/133, &(0x7f00000016c0)=[r1, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, r2, r3], 0x7}, 0x50) wait4(0x0, 0x0, 0x8, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$P9_RAUTH(r4, &(0x7f00000000c0)={0x14, 0x67, 0x2, {0x10, 0x0, 0x3}}, 0x14) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:36:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x6, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0x67, 0x8}, 0x20) [ 1053.407468][ T1983] R10: fffff520005dce54 R11: ffffc90002ee72a6 R12: 0000000000000000 [ 1053.422333][ T1983] R13: ffff88804a819250 R14: ffff88804a819050 R15: 0000000030746973 [ 1053.463537][ T1983] FS: 00007f18ab80a700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1053.518623][ T1983] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1053.529061][ T1983] CR2: 0000000000625208 CR3: 00000000888a1000 CR4: 00000000001406f0 [ 1053.548376][ T1983] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 16:36:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2040, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x11, 0x100, 0x5, 0x1f, 0x40, r0, 0x8, [], 0x0, r2, 0x0, 0x3, 0x3}, 0x40) [ 1053.563797][ T1983] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1053.582467][ T1983] Kernel panic - not syncing: Fatal exception [ 1053.590332][ T1983] Kernel Offset: disabled [ 1053.594683][ T1983] Rebooting in 86400 seconds..