me-offset) [ 2855.331760][ T2856] BPF:) [ 2855.341505][ T2856] BPF: [ 2855.365008][ T2856] BPF:Invalid return type [ 2855.389268][ T2856] BPF: [ 2855.389268][ T2856] 09:57:35 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2855.439227][ T2859] BPF: Invalid name_offset:3 [ 2855.464472][ T2860] BPF: Invalid name_offset:3 09:57:35 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000700)=""/220, 0x1a, 0xdc, 0x8}, 0x15) [ 2855.585471][ T2863] BPF:[1] FUNC_PROTO (anon) [ 2855.616818][ T2863] BPF:return=0 args=( [ 2855.636240][ T2863] BPF:0 (anon) [ 2855.647039][ T2867] BPF:Total section length too long [ 2855.658158][ T2863] BPF:, 4 (invalid-name-offset) 09:57:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018008000000000000c0000000c00000002000000000000000000000f000000000000"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000340)) write$cgroup_int(r2, &(0x7f0000000000), 0xffffff6a) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000600)=ANY=[@ANYPTR64], 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000000200)={@rand_addr="5218721cd3033e4d1958a14070c7fae7", r4}, 0x187) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000180)={0x0, @bcast, @rose={'rose', 0x0}, 0xf7, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x400, 0x4, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}) bind$bt_hci(r2, &(0x7f0000000500)={0x1f, r4, 0x1}, 0xc) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x10, r4}) 09:57:35 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") readv(r1, &(0x7f0000000380)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/193, 0xc1}, {&(0x7f00000001c0)=""/139, 0x8b}, {&(0x7f0000000000)=""/43, 0x2b}, {&(0x7f0000000280)=""/22, 0x16}, {&(0x7f0000001800)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/185, 0xb9}], 0x7) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x6, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2855.686918][ T2863] BPF:) [ 2855.691199][ T2863] BPF: [ 2855.693993][ T2863] BPF:Invalid arg#1 [ 2855.697806][ T2863] BPF: [ 2855.697806][ T2863] [ 2855.792639][ T2870] BPF:[1] FUNC_PROTO (anon) [ 2855.823464][ T2870] BPF:return=0 args=( [ 2855.843761][ T2849] BPF:[1] PTR (anon) [ 2855.853504][ T2870] BPF:0 (anon) [ 2855.857056][ T2870] BPF:, 4 (invalid-name-offset) [ 2855.873400][ T2870] BPF:) [ 2855.876282][ T2870] BPF: [ 2855.879531][ T2849] BPF:type_id=268435456 09:57:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[], &(0x7f00000000c0)=""/224, 0xfffffffffffffe8a, 0xbe, 0x8}, 0x20) 09:57:35 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x2}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2855.894076][ T2870] BPF:Invalid arg#1 [ 2855.898659][ T2873] BPF:Section overlap found [ 2855.901235][ T2849] BPF: [ 2855.906071][ T2870] BPF: [ 2855.906071][ T2870] [ 2855.915913][ T2849] BPF:Invalid type_id [ 2855.934612][ T2849] BPF: [ 2855.934612][ T2849] 09:57:35 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000001280), &(0x7f00000012c0)=0x40) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") 09:57:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[], &(0x7f0000000700)=""/220, 0x0, 0xdc, 0x8}, 0x20) [ 2856.049007][ T2879] BPF:btf_header not found [ 2856.054957][ T2877] BPF:[1] FUNC_PROTO (anon) [ 2856.088818][ T2877] BPF:return=0 args=( [ 2856.111190][ T2877] BPF:0 (invalid-name-offset) [ 2856.121045][ T2877] BPF:, 4 (invalid-name-offset) [ 2856.158217][ T2877] BPF:) [ 2856.171533][ T2877] BPF: [ 2856.185850][ T2877] BPF:Invalid arg#1 [ 2856.214743][ T2877] BPF: [ 2856.214743][ T2877] [ 2856.238960][ T2887] BPF:[1] FUNC_PROTO (anon) 09:57:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0)=0x2, 0x12) sendfile(r1, r2, &(0x7f0000000000), 0xffe) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={'gre0\x00', {0x2, 0x4e23, @multicast1}}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") poll(&(0x7f0000000100)=[{r3, 0x14}], 0x1, 0x3) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2856.268427][ T2888] BPF:hdr_len not found [ 2856.272985][ T2887] BPF:return=0 args=( [ 2856.289565][ T2887] BPF:0 (invalid-name-offset) [ 2856.311275][ T2889] BPF:hdr_len not found [ 2856.334551][ T2887] BPF:, 4 (invalid-name-offset) [ 2856.364104][ T2887] BPF:) [ 2856.378331][ T2887] BPF: [ 2856.379037][ T2895] BPF:[1] ENUM (anon) [ 2856.394930][ T2887] BPF:Invalid arg#1 [ 2856.396818][ T2895] BPF:size=4 vlen=1 [ 2856.411479][ T2887] BPF: 09:57:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="afeb010018000000000000000c0000000c00000002000000000021f700000002000000100000"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2856.411479][ T2887] [ 2856.411634][ T2895] BPF: [ 2856.436668][ T2895] BPF:Invalid name 09:57:36 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2856.468579][ T2895] BPF: [ 2856.468579][ T2895] 09:57:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x2, 0x0, 0x0, 0x1, 0x0, 0x3a, 0x0, 0x59, 0x4}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="7f454c4680ec9f01030000000000000000000300ff0f000084030000000000004000000000000000700200000000000000000000ff0738000200008008008000050000000b00000002000000000000000100000000000000fbffffffffffffff080000000000000003000000000000000000000001000000555803043c859c229412086542d5889a36d52edf8577f64ea4ecb0d43a9914f343166920cf9310c2a876b0a4ae929115ac2a9e8eab89455ee1fd36be405f675e136c403b8d01bf017305accd16f3730e7a66e4594b904370ca2a4c9c9562aa1f619504d2467cd185119f35abc8da9b594f1bbf6afa9ec1052353f24d27a3c6927996c925cfbbeb48c47a4c1dba13a2d24e36b02f1240a84ecd08dc9fa2eb68322acdd627ca41eff661229000"/1301], 0x523) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000200), &(0x7f0000000240)=0x4) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="18000000", @ANYRES16=r3, @ANYBLOB="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"], 0x18}, 0x1, 0x0, 0x0, 0x40094}, 0x40000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r4, &(0x7f0000000080), 0x15d4b87) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000300)={0x8f7d, 0x1, 0xa000}, 0x4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r5, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r5, 0x6628, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r6, 0x84, 0x1b, &(0x7f0000000480)={r8}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r5, 0x84, 0x78, &(0x7f0000000380)=r8, 0x4) ioctl$EXT4_IOC_SETFLAGS(r4, 0x6628, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000280)={0x6b9d, 0x1, 0x0, 0x8, 0x3}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000002c0)={'caif0\x00', 0x80000001}) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r9, 0x401c5820, &(0x7f0000000340)) write$cgroup_int(r9, &(0x7f0000000000), 0xffffff6a) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r10, &(0x7f0000000600)=ANY=[@ANYPTR64], 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_mreq(r10, 0x29, 0x15, &(0x7f0000000200)={@rand_addr="5218721cd3033e4d1958a14070c7fae7", r11}, 0x187) bind$bt_hci(r9, &(0x7f0000000500)={0x1f, r11, 0x1}, 0xc) r12 = socket$nl_netfilter(0x10, 0x3, 0xc) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000021c0)=0xc) sendmsg$netlink(r12, &(0x7f0000001f80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@cred={{0x1c, 0x1, 0x2, {0x0, r14}}}], 0x20}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@dev={0xac, 0x14, 0x14, 0x2a}, @in6=@local, 0x4e24, 0x2, 0x4e23, 0x0, 0x1, 0x20, 0xa0, 0x98, r11, r14}, {0x3ff, 0x8, 0x4, 0xeae8, 0x1000, 0x7, 0xfffffffffffffffa, 0x8}, {0xc64, 0x7, 0x83, 0xfffffffffffffff7}, 0x5, 0x6e6bbb, 0x0, 0x0, 0x1, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x33}, 0x14, @in6=@mcast1, 0x3505, 0x3, 0x1, 0x7f, 0x0, 0x8}}, 0xe8) [ 2856.542405][ T2901] BPF:[1] ENUM (anon) [ 2856.558527][ T2900] BPF:[1] Invalid name_offset:2 [ 2856.576063][ T2901] BPF:size=4 vlen=1 [ 2856.613477][ T2901] BPF: [ 2856.615918][ T2904] BPF:Invalid magic [ 2856.631426][ T2906] BPF:Invalid magic [ 2856.633964][ T2901] BPF:Invalid name [ 2856.641570][ T2907] BPF:[1] FUNC_PROTO (anon) [ 2856.648679][ T2901] BPF: [ 2856.648679][ T2901] [ 2856.652007][ T2907] BPF:return=0 args=( [ 2856.685536][ T2907] BPF:0 (invalid-name-offset) 09:57:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/179, 0xb3}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/72, 0x48}, {&(0x7f0000000240)=""/136, 0x88}], 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000002000000100000"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:57:36 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) socket$inet6_udplite(0xa, 0x2, 0x88) socket$rxrpc(0x21, 0x2, 0x2) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000002c0), 0xfefe) sendfile(r3, r4, &(0x7f0000000000), 0xffe) ioctl$EXT4_IOC_SETFLAGS(r4, 0x6628, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000000)={0x2, 0x1ff, 0x20, 0x7f}, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xfffffffffffffd4f, 0x8}, 0x20) [ 2856.707519][ T2907] BPF:, 4 (invalid-name-offset) [ 2856.741613][ T2907] BPF:) [ 2856.757387][ T2907] BPF: [ 2856.771366][ T2907] BPF:Invalid arg#1 [ 2856.802344][ T2907] BPF: [ 2856.802344][ T2907] [ 2856.829148][ T2918] BPF:[1] FUNC_PROTO (anon) [ 2856.849633][ T2918] BPF:return=0 args=( [ 2856.852793][ T2879] BPF:btf_header not found [ 2856.856084][ T2918] BPF:0 (invalid-name-offset) [ 2856.867546][ T2918] BPF:, 4 (invalid-name-offset) [ 2856.878976][ T2918] BPF:) [ 2856.882112][ T2921] BPF:[1] PTR (anon) [ 2856.886574][ T2921] BPF:type_id=268435456 [ 2856.894256][ T2918] BPF: [ 2856.897147][ T2918] BPF:Invalid arg#1 [ 2856.903688][ T2921] BPF: [ 2856.906551][ T2921] BPF:Invalid type_id [ 2856.913112][ T2918] BPF: [ 2856.913112][ T2918] [ 2856.928147][ T2921] BPF: [ 2856.928147][ T2921] 09:57:37 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xffffffffffffff42}}, &(0x7f0000000700)=""/209, 0x26, 0xdc}, 0xa) 09:57:37 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:57:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0162bf0000000000000014000000140000000200000000000000010000060400"/46], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2857.222095][ T2927] BPF:[1] FUNC_PROTO (anon) [ 2857.232733][ T2927] BPF:return=0 args=( [ 2857.238976][ T2928] BPF:btf_header not found [ 2857.247165][ T2927] BPF:0 (invalid-name-offset) [ 2857.247178][ T2927] BPF:, 4 (invalid-name-offset) [ 2857.268313][ T2927] BPF:) [ 2857.270778][ T2930] BPF:btf_header not found [ 2857.279298][ T2927] BPF: [ 2857.290229][ T2927] BPF:Invalid arg#1 [ 2857.303352][ T2927] BPF: [ 2857.303352][ T2927] [ 2857.328180][ T2931] BPF:[1] FUNC_PROTO (anon) [ 2857.345495][ T2931] BPF:return=0 args=( [ 2857.357722][ T2931] BPF:0 (invalid-name-offset) [ 2857.372289][ T2911] BPF:[1] Invalid name_offset:2 09:57:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x0, &(0x7f0000000280)="700000000000000000f6faaea1f99dbfac3284d2e4537ec4") ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r0, &(0x7f0000000180)="28a8021eff8fd7a20de28b01eb354b7d8b8a", 0x12) r2 = accept(r0, &(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev}, &(0x7f0000000000)=0x80) connect$netlink(r2, &(0x7f0000000140)=@proc={0x10, 0x0, 0x25dfdbfd, 0x800000}, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb0142b24d8d86edec9f3d0018000000000000001400000014000000020000000000000001000006040000000000000000002b440000e761ace2fa409790f17509b2ca3bfa9b4187c263776cc751a4f3f3439ab10ac93b833981d498d6aa7cd5c04bfa8d5d191dd18d2e49e0158d7dc3433acf2e60ae070bd54749d0f8633b7bd9a9729085a42e3bd055d1751601d5155ffcbd18014a0f9ac218fed4cba9aae14879bcb2a62f4d8a06e624cf4886118bf4aa13a3d2971c"], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) r3 = socket$xdp(0x2c, 0x3, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) [ 2857.379215][ T2931] BPF:, 4 (invalid-name-offset) 09:57:37 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") getsockname(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000100)=0x80) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000140)=0x24c9, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000000f0088395d3addcd84ccc30000000000965780e82c6c8dbda93984e5ea133cf107278569082f003686bb00df0a7e84d57d47c264fd2b965b905c7b23ddb4890597fce44ccc3aaf49c8e09921b0061b36a6711c4423abe1da8d9145a4a47477bc2e669546698a72812fff33780f3a1f61120c1777abfb655b7cc374934c1932b9bf64977a1286b625a85bca4ace0122829badc80bd352c0ba629487c119c4fb5abbf3dd3d49d4577a7e404939ad7274a3c0ec9a3ca460f995"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2857.401052][ T2931] BPF:) [ 2857.412962][ T2931] BPF: [ 2857.425540][ T2931] BPF:Invalid arg#1 [ 2857.439585][ T2931] BPF: [ 2857.439585][ T2931] [ 2857.489324][ T2937] BPF:btf_header not found 09:57:37 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2857.546074][ T2939] BPF:btf_header not found [ 2857.582284][ T2941] BPF:Invalid string section [ 2857.603885][ T2943] BPF:Invalid string section 09:57:37 executing program 0: r0 = socket(0xa, 0x4, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01000000000000000000030000001400010010000100756470d1866f94a6490fef3a"], 0x28}}, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa0bf4f17c9c345b1}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, r2, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x81}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xab9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x81}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000010}, 0x4000000) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) 09:57:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x86, 0xc7, 0x2}}, &(0x7f0000000700)=""/220, 0x1a, 0xdc, 0x88}, 0x20) [ 2857.642307][ T2946] BPF:[1] FUNC_PROTO (anon) [ 2857.646290][ T2921] BPF:[1] PTR (anon) [ 2857.647414][ T2946] BPF:return=0 args=( [ 2857.655583][ T2946] BPF:0 (invalid-name-offset) [ 2857.660478][ T2946] BPF:, 4 (invalid-name-offset) [ 2857.664107][ T2921] BPF:type_id=268435456 [ 2857.674828][ T2921] BPF: [ 2857.685139][ T2946] BPF:) 09:57:37 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) r2 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0xe, 0x80800) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r3, 0x6628, 0x0) mmap$xdp(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2, 0x40010, 0xffffffffffffffff, 0x180000000) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000800)='mrent\xb0C$\x00\x00\x00#z\x9fw\x94\xf1\x19\x00\xf7\xd6R\xfc9\x91\x9aL\xceyt\xf9z\xab0\x19\xf0\x84\x13e\xb0{\x88\'\xbb\x96\xfa${G\xb2\xd0\xac]\x1f\t\xb2(|\xc4\xa9\x89r1H\x87\xdb\xea%\x89\xaa?\xf3\xfa\xe7\xe5\x88\xce\x96.\xbb\x10I\xb50x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_mreq(r4, 0x29, 0x15, &(0x7f0000000200)={@rand_addr="5218721cd3033e4d1958a14070c7fae7", r8}, 0x187) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f00000003c0)={@loopback, r8}, 0x14) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r9, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") setsockopt$inet_icmp_ICMP_FILTER(r9, 0x1, 0x1, &(0x7f0000000540)={0xfff}, 0x4) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000500)=0x9, 0x4) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000240)={0x1bacf914c1babff, &(0x7f0000000080)}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000340)=[@in6={0xa, 0x4e21, 0x9, @empty, 0x7}, @in6={0xa, 0x4e23, 0x3, @rand_addr="e8d6b1bbf4c584800bf9514c43636ff8", 0x81}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x24}}], 0x58) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000008000000000c0000000c00000002000000000000000000000f57510000000059f95da1bb9eb61733601321f31e57ef84a33bb60946155989cf2ec3a3e6b1e209ec13323b2c7037fe116b5c62a2f4b8e11c61ab23b5e42d579703ab56582837023c595f3c056a4eed9e175f6e115bf454bb8be92b2196191ed2cd4831c780dee281da8ed2510d6e5f9ec363f0368ca2650e399d0b9ad30d8e444f40a622970d746cb17100"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2857.696464][ T2946] BPF: [ 2857.707969][ T2921] BPF:Invalid type_id [ 2857.714411][ T2946] BPF:Invalid arg#1 [ 2857.719295][ T2946] BPF: [ 2857.719295][ T2946] [ 2857.736083][ T2921] BPF: [ 2857.736083][ T2921] 09:57:37 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}}, &(0x7f0000000700)=""/211, 0x2e, 0xd3, 0x6}, 0x20) [ 2857.769731][ T2950] BPF:[1] FUNC_PROTO (anon) [ 2857.787996][ T2950] BPF:return=0 args=( [ 2857.799030][ T2950] BPF:0 (invalid-name-offset) [ 2857.807232][ T2954] Enabling of bearer rejected, illegal name [ 2857.826317][ T2950] BPF:, 4 (invalid-name-offset) 09:57:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a00b5055e0bcfe87b0071986db5178922a4ea54e0450da00c713a7bcf2fea87ab32ec1cbd0a427b08a68bfdf28309306b0dcdbf9428356b0e4f48edb89f93edc9b8aa18052291fcc48fd3b06c9c8317fa5f859c2496d7020402574faca0867fc4632db2696d2e68cc354bad4bad080b01b4c5f638f9a2fd97d88cc9fbfc2e55fedc63cc073717") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000240)=0x480, 0x4) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000200)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r3, 0x6628, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0xc) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)=0x7, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r4, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r4, 0x6628, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x18, &(0x7f0000000040)=0x6, 0x4) [ 2857.848041][ T2950] BPF:) [ 2857.864201][ T2950] BPF: [ 2857.894389][ T2950] BPF:Invalid arg#1 [ 2857.898319][ T2950] BPF: [ 2857.898319][ T2950] [ 2857.944726][ T2958] BPF:btf_header not found 09:57:37 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x6}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2857.986494][ T2964] BPF:Unsupported section found 09:57:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000002c0), 0xfefe) sendfile(r3, r4, &(0x7f0000000000), 0xffe) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @loopback}}, 0x40, 0x2d9}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={r5, @in6={{0xa, 0x4e22, 0x5, @mcast1, 0x4}}, 0x5, 0x2, 0x7, 0x7, 0x3}, &(0x7f0000000240)=0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000280)={{0xa, 0x4e22, 0x2, @local}, {0xa, 0x4e20, 0x8, @mcast2, 0x1}, 0xfffe, [0x8, 0x7, 0xfff, 0x10000, 0x2, 0x5, 0x200, 0xcaf9]}, 0x5c) [ 2858.129577][ T2974] BPF:[1] FUNC_PROTO (anon) [ 2858.166942][ T2974] BPF:return=0 args=( 09:57:38 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000080)={0xffffffffffffffff, 0x1}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xc}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) [ 2858.188196][ T2974] BPF:0 (invalid-name-offset) [ 2858.211118][ T2974] BPF:, 4 (invalid-name-offset) [ 2858.216131][ T2974] BPF:) [ 2858.233709][ T2974] BPF: [ 2858.243093][ T2979] BPF:[1] ENUM (anon) [ 2858.247353][ T2974] BPF:Invalid arg#1 09:57:38 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) recvmmsg(r0, &(0x7f00000042c0)=[{{&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000002800)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000000000)=""/58, 0x3a}, {&(0x7f0000001800)=""/4096, 0x1000}, {&(0x7f0000000140)=""/255, 0xff}, {&(0x7f0000000240)=""/182, 0xb6}, {&(0x7f0000000300)=""/178, 0xb2}, {&(0x7f0000000440)=""/235, 0xeb}, {&(0x7f0000000540)=""/246, 0xf6}, {&(0x7f0000000640)=""/101, 0x65}], 0x9}, 0x1}, {{&(0x7f00000028c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000002940)=""/4096, 0x1000}, {&(0x7f0000003940)=""/194, 0xc2}, {&(0x7f0000003a40)=""/221, 0xdd}], 0x3, &(0x7f00000006c0)=""/1, 0x1}, 0x67e9}, {{0x0, 0x0, &(0x7f0000003c40)=[{&(0x7f0000003b40)=""/56, 0x38}, {&(0x7f0000003b80)=""/130, 0x82}], 0x2, &(0x7f0000003c80)=""/52, 0x34}, 0xa214}, {{&(0x7f0000003cc0)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000004200)=[{&(0x7f0000003d40)=""/2, 0x2}, {&(0x7f0000003d80)=""/157, 0x9d}, {&(0x7f0000003e40)=""/237, 0xed}, {&(0x7f0000003f40)}, {&(0x7f0000003f80)=""/104, 0x68}, {&(0x7f0000004000)=""/156, 0x9c}, {&(0x7f00000040c0)=""/118, 0x76}, {&(0x7f0000004140)=""/163, 0xa3}], 0x8, &(0x7f0000004280)=""/9, 0x9}, 0xffffffff}], 0x4, 0x60, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000003f40)=@buf={0x72, &(0x7f0000004400)="415f0a0c5411b750cbbba4ecc840faecfa1e48fd7f7b5d8dfde20b9cb4a13d73e8ae534647fe31cfeb0fb8053b18451745d61ff93263447a4f7082d2ffd30c596f1727df35682867c15e7deb4de1654ac123382b1d6c69a71fff8284870d08ed88cb21317a4815d8b10380dd42a64cdc4fa8"}) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000043c0)=0xfffffff9, 0x4) [ 2858.273431][ T2979] BPF:size=4 vlen=1 [ 2858.277407][ T2974] BPF: [ 2858.277407][ T2974] [ 2858.290643][ T2979] BPF: [ 2858.299132][ T2984] BPF:[1] FUNC_PROTO (anon) [ 2858.304580][ T2979] BPF:Invalid name [ 2858.320633][ T2984] BPF:return=0 args=( [ 2858.325949][ T2979] BPF: [ 2858.325949][ T2979] [ 2858.333314][ T2984] BPF:0 (invalid-name-offset) [ 2858.352315][ T2986] BPF:[1] FUNC a [ 2858.358080][ T2986] BPF:type_id=0 [ 2858.374419][ T2984] BPF:, 4 (invalid-name-offset) [ 2858.385722][ T2986] BPF: [ 2858.395208][ T2986] BPF:vlen != 0 [ 2858.399311][ T2984] BPF:) [ 2858.402390][ T2988] BPF: Invalid name_offset:3 [ 2858.416130][ T2986] BPF: [ 2858.416130][ T2986] [ 2858.421558][ T2984] BPF: [ 2858.424441][ T2984] BPF:Invalid arg#1 [ 2858.430620][ T2990] BPF: Invalid name_offset:3 [ 2858.444761][ T2984] BPF: [ 2858.444761][ T2984] 09:57:38 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:57:38 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2858.616050][ T2994] BPF:[1] FUNC_PROTO (anon) [ 2858.645491][ T2958] BPF:btf_header not found [ 2858.656523][ T2994] BPF:return=0 args=( [ 2858.674065][ T2994] BPF:0 (invalid-name-offset) [ 2858.691118][ T2994] BPF:, 4 (invalid-name-offset) [ 2858.701387][ T2994] BPF:) [ 2858.716845][ T2994] BPF: [ 2858.732037][ T2994] BPF:Invalid arg#1 [ 2858.736901][ T2998] BPF: Invalid name_offset:3 [ 2858.750698][ T2994] BPF: [ 2858.750698][ T2994] 09:57:38 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x6628, 0x0) r3 = accept4$inet6(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x1c, 0x0) sendfile(r1, r3, &(0x7f0000000100)=0xa, 0x80000001) [ 2858.773459][ T2999] BPF:[1] FUNC_PROTO (anon) [ 2858.789758][ T2970] BPF:Unsupported section found [ 2858.797234][ T2999] BPF:return=0 args=( [ 2858.809372][ T2999] BPF:0 (invalid-name-offset) [ 2858.831031][ T2999] BPF:, 4 (invalid-name-offset) [ 2858.845454][ T2999] BPF:) [ 2858.860650][ T2999] BPF: [ 2858.872985][ T2999] BPF:Invalid arg#1 09:57:38 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000002000000100000"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) r1 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x180c00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x6628, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0x3a, "373c0c6d818be50e0b69a4036b34149976f2463526a44cc3f29707f0a5d54e5f452ca0e869c683f6e093d222bd2cb5a8cd88698aa67cae1cd577"}, &(0x7f0000000100)=0x42) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r3, 0x4}, 0x8) [ 2858.888570][ T2999] BPF: [ 2858.888570][ T2999] 09:57:38 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x8}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2858.950684][ T2979] BPF:[1] ENUM (anon) [ 2858.969001][ T2979] BPF:size=4 vlen=1 [ 2858.984463][ T2979] BPF: [ 2859.041003][ T2979] BPF:Invalid name [ 2859.059686][ T2979] BPF: [ 2859.059686][ T2979] [ 2859.082225][ T3004] BPF:[1] DATASEC (anon) [ 2859.098316][ T3004] BPF:size=0 vlen=0 09:57:39 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000140000001406000002000000000000000100000604000100"/46], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) accept$alg(r2, 0x0, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'aead\x00', 0x0, 0x0, 'gcm-aes-ce\x00'}, 0xfffffffffffffe74) r3 = accept$alg(r1, 0x0, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000002c0), 0xfefe) sendfile(r3, r4, &(0x7f0000000000), 0xffe) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000000), &(0x7f00000000c0)=0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r5, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r5, 0x6628, 0x0) setsockopt$inet_tcp_buf(r5, 0x6, 0x1a, &(0x7f0000000100)="879f975e4b484a5be127969f69fd878a4e328b772f079c87e126896a5cd1d3080d576d30868500aa0b5848586640de76f8273a41d50f9e1448cc1e250f206253f6d08e8314561414c802726a640c72bf525c0082cdfbb1fc9ac7bb07007e62881c3ec123f616d55f10b3065ed3cfdf75d870d16e44c85065cdc0ae5afadeeda9da67f81fb67289c8c70465c477210988bf59f35aca9d5e1f98c4320bec60dc5408e0466e319b5868af50050cf1f17e", 0xaf) [ 2859.135160][ T3004] BPF: [ 2859.149777][ T2989] BPF:[1] FUNC a [ 2859.161090][ T3004] BPF:vlen == 0 [ 2859.164800][ T3004] BPF: [ 2859.164800][ T3004] [ 2859.174616][ T3007] BPF:[1] PTR (anon) [ 2859.180497][ T3010] BPF:[1] FUNC_PROTO (anon) [ 2859.190173][ T2989] BPF:type_id=0 [ 2859.197102][ T3010] BPF:return=0 args=( [ 2859.201678][ T3007] BPF:type_id=268435456 [ 2859.210487][ T3010] BPF:0 (invalid-name-offset) [ 2859.217285][ T3007] BPF: [ 2859.220464][ T2989] BPF: [ 2859.226998][ T3010] BPF:, 4 (invalid-name-offset) [ 2859.233749][ T3007] BPF:Invalid type_id [ 2859.243601][ T3010] BPF:) [ 2859.247184][ T2989] BPF:vlen != 0 [ 2859.254221][ T3007] BPF: [ 2859.254221][ T3007] [ 2859.259290][ T3010] BPF: [ 2859.265472][ T3010] BPF:Invalid arg#1 [ 2859.269484][ T2989] BPF: [ 2859.269484][ T2989] [ 2859.279317][ T3010] BPF: [ 2859.279317][ T3010] [ 2859.320827][ T3014] BPF:[1] FUNC_PROTO (anon) [ 2859.340422][ T3014] BPF:return=0 args=( [ 2859.351148][ T3014] BPF:0 (invalid-name-offset) [ 2859.371936][ T3014] BPF:, 4 (invalid-name-offset) [ 2859.378848][ T3017] BPF:Invalid section offset [ 2859.379227][ T3014] BPF:) [ 2859.400107][ T3014] BPF: [ 2859.409231][ T3014] BPF:Invalid arg#1 [ 2859.421189][ T3014] BPF: [ 2859.421189][ T3014] 09:57:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$bt_rfcomm(0x1f, 0x1, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xc}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2859.452905][ T2998] BPF: Invalid name_offset:3 09:57:39 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000140)=0x3, 0x1) 09:57:39 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xa}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2859.609290][ T3021] BPF:[1] FUNC_PROTO (anon) [ 2859.631059][ T3021] BPF:return=0 args=( [ 2859.635286][ T3021] BPF:0 (invalid-name-offset) [ 2859.665358][ T3021] BPF:, 4 (invalid-name-offset) [ 2859.691113][ T3021] BPF:) [ 2859.694040][ T3021] BPF: [ 2859.717738][ T3021] BPF:Invalid arg#1 [ 2859.731222][ T3021] BPF: [ 2859.731222][ T3021] [ 2859.738768][ T3024] BPF:[1] FUNC a [ 2859.764107][ T3025] BPF:[1] FUNC_PROTO (anon) [ 2859.764136][ T3024] BPF:type_id=0 [ 2859.803327][ T3025] BPF:return=0 args=( [ 2859.807523][ T3025] BPF:0 (invalid-name-offset) [ 2859.827532][ T3025] BPF:, 4 (invalid-name-offset) [ 2859.833547][ T3028] BPF: Invalid name_offset:3 [ 2859.845871][ T3024] BPF: [ 2859.848704][ T3024] BPF:vlen != 0 [ 2859.855674][ T3025] BPF:) [ 2859.859221][ T3029] BPF: Invalid name_offset:3 [ 2859.866297][ T3025] BPF: 09:57:39 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") sendfile(r1, r2, &(0x7f0000000000), 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2859.877444][ T3009] BPF:[1] DATASEC (anon) [ 2859.882001][ T3025] BPF:Invalid arg#1 [ 2859.885886][ T3025] BPF: [ 2859.885886][ T3025] [ 2859.898647][ T3009] BPF:size=0 vlen=0 [ 2859.901207][ T3024] BPF: [ 2859.901207][ T3024] [ 2859.915996][ T3009] BPF: 09:57:39 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1c}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2859.930580][ T3031] BPF:[1] PTR (anon) [ 2859.935395][ T3009] BPF:vlen == 0 [ 2859.947480][ T3009] BPF: [ 2859.947480][ T3009] [ 2859.988310][ T3031] BPF:type_id=268435456 09:57:39 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r1 = getuid() r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000002c0), 0xfefe) sendfile(r3, r4, &(0x7f0000000000), 0xffe) splice(r0, &(0x7f0000003b80), r3, &(0x7f0000003bc0), 0x9, 0x2) r5 = socket$bt_cmtp(0x1f, 0x3, 0x5) sendmsg$nl_generic(r0, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x880}, 0xc, &(0x7f0000000680)={&(0x7f0000002800)={0x136c, 0x1f, 0x300, 0x70bd29, 0x25dfdbff, {0x18}, [@nested={0xf0, 0x32, [@generic="7a2d1a24881fa4cf9955baf180309c66679738d298a6773c542dbc61b2c5016c8fa0b7e30c4522039ecaa26a10d130984acd23884bd195e0f444eb17fcf878956a0c717396e3274eacfa29ebd935b5d6dccfd8be303d633f735aa55238db3ccc290606fa07aa3f438154b44f2c075b3fff1ff6d52ee99e2bc4fb80b33fb5336f0b3bbd67ef0c217e476cd0cd02e36fc4c67ef56b1b3d4bd1b7b56f2f6fcb948caa5462524d4147ddcdba2db67018c00c228205eacc6c98ddaba6b3d6c88baff6ae8f4520ccc4caf2c65b283a767af9b7920e7221ae762ca0ca1079d0006d", @typed={0xc, 0x6, @u64}]}, @generic="cfa8c1667362c2731fe193d0b3ac56ffe204d6a097049c52d1a3e281ef78985237fd0f80c92b9ad2734451d1ad5ad13f57bbe5a05aca268649c2862bc9804d1f3150386a8fd620e62272cc11a3a09f69cb4d193eb512eac533b597c32764eb8a3d2479a4881c08560ae2d40244a5e5f5cc658acb9e97f2408795836771ecba13219da606f6bfc63319c0924c2fceafd7b9ee249b155941bd61a411d097974cf016a0c1c248bfcf6d7572e80a917187536c525d8fc125bbd10c31697a12291361a9c2b64fd28a154ae5dece1160f6ca914e7d965607", @typed={0x8, 0x8b, @ipv4=@multicast2}, @nested={0x7c, 0x48, [@typed={0x8, 0x88, @uid=r1}, @typed={0x8, 0x50, @fd=r5}, @generic="ea0c375f28b0e29857f8c29a5a8dee83748735273d23d3025da97cb1ce41477ace8bdc8a20bee01d0619530422dfee99049439fdeda67af64dc0c187fc3830142cf01aacc672", @typed={0x20, 0x55, @str='cpuacct.usage_percpu_sys\x00'}]}, @generic="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", @generic="b40b71f1b488fff34b62e0d9769637a3782dabecee5757168b29de45b130679431ccd73d653e4417d178c4d43c7c41d3c3f2466dcca445a94808ad55cb6590f03073bbabae5f3505d1f9606b1d5981d9a0c2d6cd90c625244ae5c4c54a8fd4caae63e715217d6bea6b4a57acd68b08c28a49420a1520b86532dd1c0a653d2face185fc2b1ac311471111fd2a12f2880d2c8d54927daf2794b1976c819f40d9d09ddae1f126436990d6e6b796579ce95011940ec80f82229e13b8cce06a1494895e7a7e57464534e2d0313d537680a17a7afaaa73299cffb10e82f506456dba7b4e38ff8ab5d9e83d91b8ff86fbbf616fb270e9a6541d", @typed={0xc, 0x53, @u64=0x85}, @typed={0xc, 0x32, @u64}]}, 0x136c}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x6628, 0x0) sendmsg$tipc(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000080)="2a6edae9e60524d374a28a96d73a794c278b33514b844fd8461bea992cada47cfd454727bfb33f6fce2bf0d95e374bfded701ca565503c18dff88e9aad4655878928e7ba345741b81cb3e67c7b4bde1513ef5b5e9962160d0e1f48cdbff734c51cba4c543a06128b44d0a6c6fc580fee7de7f3f8e0f17504b5dfeb320884929b77d6d35e02fa2e4c82de0a7165bc6535b23427c19690664ed8f7f116a87a85f028d123748698bef2aad5535502918437677986a02775c643e61cb7d0c6059e03ec9baefabafa63a0ab97db9a3782", 0xce}, {&(0x7f0000000180)="22ee5744f35e124adaac19bb21da4d3c79da15ec393b462f7680d5e8238442c6d503f2fbd7c94e648fe825c62bdfbb25a0d215798b1e0013a10fea963c87057463c6287a8861d06aa201eedf1de4965b28b502bf0350bcedad4847f44f0aa1393e92b2527bffe9d1b853cc07881cbab7253397156b1f4e663179ed876072e95f8689c4ec3f57893b2dcc218b77c746218c828349f59f152621518eea896b7e914615c7f10015eca471d2471c2bf889d5bd90f07d4d27ed9c3b4d3a45b62ef1f379c19b91727b70d2e121a939d4a7a7953d29539092ec", 0xd6}, {&(0x7f0000000280)="239a9e433b4e45cb65b2171d9fe13c7786251179117891133bcbc960578401e82ac285d5148193a30887440d308df52341125275732987d30bca35a1a03cf338271556e4fc9bc33797abf39b368482d63f308e56c98cfb5ea3555189d5ee", 0x5e}, {&(0x7f0000000300)="38574d9eafd102fe2be235e3d622e3bc522c399b83073e8b367385c7f87b527d8dff4e57", 0x24}, {&(0x7f0000000800)="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", 0x1000}, {&(0x7f0000000340)="19e7a042006e5fb39ed930b725ea9e3b360bab9d26fa1675426903ae3a91739ef5b2e14a262c976a68901bea31cf87e2d561913efdc9b43ced90c2563e7c3af65f6d", 0x42}, {&(0x7f0000000440)="6ca6a7d8c73323dc41f73348cb265e11e837c6324ba23fa2cda3499e80889d69378735aeaedba86d618e73509b0d3570735fa8f30963154afc2316323f1770b77cce77843d6ce452a6cd13de49720d6c28aa411b066c82af95aa9c82034585a060", 0x61}, {&(0x7f00000003c0)="2049e36592911db746be7f27379a603e6011360d75476b2f00bc62c1dfc6340eafac6192e4eabb95ea214deb27b9da27e10cfac156", 0x35}, {&(0x7f0000001800)="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", 0x1000}, {&(0x7f00000004c0)="74a33239f721c22836b3f8989d8733933c9ddbdd64d54ae50588f4e2f117ba084ed37a57f174281fcd321e8abfd02e2fe08e30031399f221abcb161ba6700a6f2fe929efdca94f9fcf24b807b9a72c1ba6047e22f3f199267a21b1", 0x5b}], 0xa, &(0x7f0000000600)}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003c00)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x61]}}, &(0x7f0000003c40)=""/234, 0x1b, 0xffffffffffffff72, 0x9}, 0x14) [ 2860.024742][ T3031] BPF: [ 2860.043785][ T3031] BPF:Invalid type_id [ 2860.046983][ T3039] BPF: Invalid name_offset:3 [ 2860.062594][ T3041] BPF:[1] FUNC_PROTO (anon) 09:57:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000002000000c0000000c000010f10000080000"], &(0x7f0000000700)=""/220, 0x26, 0xfffffefd}, 0x1c) [ 2860.073380][ T3031] BPF: [ 2860.073380][ T3031] [ 2860.089079][ T3041] BPF:return=0 args=( [ 2860.110734][ T3041] BPF:0 (invalid-name-offset) [ 2860.119454][ T3041] BPF:, 4 (invalid-name-offset) 09:57:40 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="88000000000600000001ba0000000000dcd2496a9759a5d027aee9f90c34e95b3bac1b"], 0x10) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x0, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) 09:57:40 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000002c0)) [ 2860.138058][ T3041] BPF:) [ 2860.143461][ T3041] BPF: [ 2860.146574][ T3041] BPF:Invalid arg#1 [ 2860.169196][ T3041] BPF: [ 2860.169196][ T3041] [ 2860.180461][ T3018] BPF:Invalid section offset [ 2860.221803][ T3048] BPF:[1] FUNC_PROTO (anon) [ 2860.241121][ T3048] BPF:return=0 args=( [ 2860.245151][ T3048] BPF:0 (invalid-name-offset) [ 2860.249823][ T3048] BPF:, 4 (invalid-name-offset) [ 2860.303789][ T3048] BPF:) [ 2860.306825][ T3048] BPF: [ 2860.337779][ T3048] BPF:Invalid arg#1 09:57:40 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xc0008000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, r2, 0x300, 0x70bd27, 0x1, {{}, 0x0, 0x8001, 0x0, {0x8}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0xc39d9dddc65feb80}, 0x40041) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000ffff0000000000000002ad4901153c0bf91a0000000000000000000000000000000000a825c0378b60ab32c6aa5f1ae331b47b6de0179d58b3525519db6aef18a08361c14ff7087723f876b95e8e6b1e90354763055743df3c8c5c2ae251a5551136bfa68876bab68050aae26c64118edd1c52349948d234ae9a893daa9295de903e7537fd21a9a5be2aeb"], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) sendto$ax25(r3, &(0x7f0000000080)="878b352949a12873f178f7af4cbea8c48dd3122ae574f19d649af814654613a22e80bdbcb491dfd92f756756a63f5203f583022d66b4524ea019c4631db035b1cead30fc526adaae920cc3e5e5b23588ea4a4bdb6581d595b20261bf1c58ca4ee5cb941b8d13da015811bc3e01879d42b87c1074fd55378e8daf32407bd649ba4ca26d4119ff08f0a06febeb5954e38629267e774dbc011dd79661de052c9ca87e07353cc2ed4962", 0xa8, 0x24000490, &(0x7f0000000200)={{0x3, @default, 0x4}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x48) [ 2860.355025][ T3048] BPF: [ 2860.355025][ T3048] [ 2860.358380][ T3057] BPF: Invalid name_offset:3 09:57:40 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1e}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:57:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000380)={0xffffffffffffffff}) accept4$vsock_stream(r1, &(0x7f00000003c0)={0x28, 0x0, 0xffffffff, @host}, 0x10, 0x100800) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000043bb9b5c6d00000000000c0000000c00000002000000000000000000000f0000000000009a5f655dc6ebc6800095b35315d4fcfc1a39a8db3ce3b21009634ab8335c409c325d0d63e4a514671834db01e20b5339d9274662be7563fdf62cb5e42278b38e933c6fa1296447d4f0956fb2f508f72f670b703d5a0fa36c3e49811ed90ee586e8c76caa4b0eb177c127640cd8e46f456da53d024a509186a2e35044ea4aaeec56fc354cf93cb411aa78510c379d852df6b888e6550b9f4fec9570fa7b7ca1394dff6f159a42e14d0e2a07d6aede8c"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:57:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") unshare(0x2000400) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xb, &(0x7f0000000140), &(0x7f00000000c0)=0x4) [ 2860.575549][ T3066] BPF:[1] FUNC_PROTO (anon) [ 2860.577165][ T3067] BPF:btf_header not found [ 2860.580180][ T3066] BPF:return=0 args=( [ 2860.608524][ T3068] BPF:btf_header not found [ 2860.640127][ T3066] BPF:0 (invalid-name-offset) [ 2860.664080][ T3066] BPF:, 4 (invalid-name-offset) [ 2860.687755][ T3066] BPF:) [ 2860.700761][ T3066] BPF: 09:57:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x6628, 0x0) r3 = accept4$x25(r2, 0x0, &(0x7f0000000080), 0x80000) ioctl$SIOCX25SFACILITIES(r3, 0x89e3, &(0x7f00000000c0)={0x38, 0x0, 0xb, 0xa, 0x1000}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000480)=ANY=[@ANYRES32=r6, @ANYBLOB='\x00\x00<\x00'], &(0x7f0000000580)=0x8) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in, @in=@dev}}, {{@in6}, 0x0, @in=@empty}}, &(0x7f0000000280)=0xe8) setsockopt$inet_icmp_ICMP_FILTER(r7, 0x1, 0x1, &(0x7f0000000100)={0x1}, 0x4) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000001880)={r6, 0x8}, &(0x7f00000018c0)=0x8) [ 2860.711953][ T3066] BPF:Invalid arg#1 [ 2860.715801][ T3066] BPF: [ 2860.715801][ T3066] [ 2860.757926][ T3075] BPF:[1] FUNC_PROTO (anon) 09:57:40 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x73) sendmmsg$inet6(r0, &(0x7f0000001640)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000880)=[@flowinfo={{0x14, 0x29, 0x4}}], 0x18}}], 0x1, 0x0) [ 2860.788097][ T3077] BPF:Invalid section offset [ 2860.792708][ T3075] BPF:return=0 args=( [ 2860.816560][ T3078] BPF:Invalid section offset [ 2860.821848][ T3075] BPF:0 (invalid-name-offset) 09:57:40 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000000)=0x4, 0x2) [ 2860.856122][ T3075] BPF:, 4 (invalid-name-offset) [ 2860.867128][ T3084] BPF:[1] DATASEC (anon) [ 2860.875781][ T3075] BPF:) [ 2860.890066][ T3084] BPF:size=0 vlen=0 [ 2860.891394][ T3075] BPF: [ 2860.911018][ T3084] BPF: [ 2860.911021][ T3075] BPF:Invalid arg#1 [ 2860.911037][ T3084] BPF:vlen == 0 [ 2860.913902][ T3075] BPF: [ 2860.913902][ T3075] [ 2860.925948][ T3084] BPF: [ 2860.925948][ T3084] 09:57:40 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x73) sendmmsg$inet6(r0, &(0x7f0000001640)=[{{&(0x7f0000000200)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000880)=[@flowinfo={{0x11, 0x29, 0x3e}}], 0x18}}], 0x2, 0x0) 09:57:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0800b5055ecfe87b1265f1e30b3f89f2d4c42a6d8de94e2f3cfe7b60b8383eb777000000000000") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000000000000000000000200000c00000000006100"], &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2861.011602][ T3092] BPF:[1] ENUM (anon) 09:57:41 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x48}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2861.041403][ T3092] BPF:size=4 vlen=1 [ 2861.045332][ T3092] BPF: [ 2861.059691][ T3092] BPF:Invalid name [ 2861.074607][ T3057] BPF: Invalid name_offset:3 [ 2861.084464][ T3092] BPF: [ 2861.084464][ T3092] 09:57:41 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0xfffffffffffffd96, &(0x7f0000000000)={&(0x7f00000001c0)=""/263, 0xfc, 0xffffffffffffffff}}, 0x10) 09:57:41 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x73) sendmmsg$inet6(r0, &(0x7f0000001640)=[{{&(0x7f0000000200)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000880)=[@flowinfo={{0x11, 0x29, 0x8}}], 0x18}}], 0x2, 0x0) [ 2861.182899][ T3102] BPF:[1] FUNC_PROTO (anon) [ 2861.206811][ T3102] BPF:return=0 args=( [ 2861.241250][ T3102] BPF:0 (invalid-name-offset) [ 2861.269877][ T3102] BPF:, 4 (invalid-name-offset) [ 2861.284917][ T3102] BPF:) [ 2861.302294][ T3102] BPF: [ 2861.306531][ T3102] BPF:Invalid arg#1 [ 2861.338336][ T3102] BPF: [ 2861.338336][ T3102] 09:57:41 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x73) sendmmsg$inet6(r0, &(0x7f0000001640)=[{{&(0x7f0000000200)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000880)=[@flowinfo={{0x11}}], 0xf}}], 0x2, 0x0) [ 2861.366946][ T3112] BPF:[1] FUNC_PROTO (anon) [ 2861.380650][ T3111] BPF:Total section length too long [ 2861.392454][ T3112] BPF:return=0 args=( [ 2861.396550][ T3112] BPF:0 (invalid-name-offset) [ 2861.424379][ T3112] BPF:, 4 (invalid-name-offset) [ 2861.440015][ T3115] BPF: Invalid name_offset:3 [ 2861.456062][ T3112] BPF:) [ 2861.459697][ T3112] BPF: [ 2861.478239][ T3115] BPF: Invalid name_offset:3 [ 2861.484553][ T3119] BPF:Total section length too long [ 2861.497998][ T3112] BPF:Invalid arg#1 09:57:41 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4c}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2861.524513][ T3112] BPF: [ 2861.524513][ T3112] 09:57:41 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:57:41 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") setsockopt(r0, 0xd0, 0x1ff, &(0x7f0000000000)="0a4305c89ec20c2e9ed9c3bd2399ad75b7", 0x11) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14}}, &(0x7f0000000700)=""/220, 0x2e, 0x3d0, 0x8}, 0xffffffffffffff15) [ 2861.658122][ T3089] BPF:[1] DATASEC (anon) [ 2861.662005][ T3124] BPF:[1] FUNC_PROTO (anon) [ 2861.681449][ T3124] BPF:return=0 args=( [ 2861.691524][ T3124] BPF:0 (invalid-name-offset) [ 2861.710312][ T3089] BPF:size=0 vlen=0 [ 2861.714723][ T3127] BPF:[1] DATASEC a [ 2861.721155][ T3127] BPF: [ 2861.728159][ T3124] BPF:, 4 (invalid-name-offset) [ 2861.740446][ T3124] BPF:) [ 2861.747239][ T3124] BPF: [ 2861.749104][ T3127] BPF:meta_left:0 meta_needed:24 [ 2861.754001][ T3124] BPF:Invalid arg#1 [ 2861.765458][ T3124] BPF: [ 2861.765458][ T3124] [ 2861.767953][ T3089] BPF: [ 2861.781244][ T3127] BPF: [ 2861.781244][ T3127] [ 2861.798426][ T3138] BPF:[1] FUNC_PROTO (anon) [ 2861.811451][ T3089] BPF:vlen == 0 [ 2861.815023][ T3089] BPF: [ 2861.815023][ T3089] [ 2861.836213][ T3092] BPF:[1] ENUM (anon) [ 2861.846543][ T3092] BPF:size=4 vlen=1 [ 2861.850425][ T3092] BPF: [ 2861.853368][ T3138] BPF:return=0 args=( [ 2861.857466][ T3138] BPF:0 (invalid-name-offset) 09:57:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$bt_rfcomm(0x1f, 0x3, 0x3) connect$bt_rfcomm(r1, &(0x7f0000002340)={0x1f, {0x8, 0x81, 0x8, 0x9, 0x9, 0xfd}}, 0xa) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="fdc2497b990000000000009d9e483acfcd0595c31191a3258ca204caa30e0f4c05cb6953f8ddcc6fc0fb10ef121096b2ad73144ad76ed96cf9b97f38ae81b5f056f3f030fbe022d284a71114b7d4d56675ef225b200f3110c418af8aed86069bacd60dce27d0d61ff83ea9f292b54bf23900955bc5c983a87c8cff8893cce4d56913fc2d49bc51f70853411ea80ff6e2a1d1d20631a6f074dc53f63fa7a9455273cf6c3b83dc12b3fe228f7bfb6d4c9d29830539fcd65090be52e89d33ab51d8434e8121385a184a278d0436d948091e6988ab41398b43f4532fe661472274ae4f0e370c8e9face51b4fd61e14f7c0c0bfa2") r2 = socket$inet_smc(0x2b, 0x1, 0x0) pwrite64(r2, &(0x7f0000000100)="f8a806421444de6a296a1612780b8dd64c9c66a7d43f9393359a2c9b6690895c83f29f79920b900206e0b4197a5fc708498d9ca198dceb2e988067aab263d41d18a139f20cb808079c629d586a937203705a47c47b079fc66d00c965bff963f09307d73b455e088bdcfc693d73c751e3700c77747f25436187c96fada9f4ce1fa6", 0x81, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r3, 0x6628, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f00000002c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xc}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)={'nat\x00', 0x3, [{}, {}, {}]}, 0x58) 09:57:41 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000180)=""/143, &(0x7f0000000000)=0x249) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2861.906451][ T3092] BPF:Invalid name [ 2861.915771][ T3092] BPF: [ 2861.915771][ T3092] [ 2861.938318][ T3138] BPF:, 4 (invalid-name-offset) [ 2861.953960][ T3149] IPVS: length: 585 != 24 [ 2861.968305][ T3149] BPF: Invalid name_offset:3 [ 2861.974814][ T3149] IPVS: length: 585 != 24 09:57:41 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000000)={'bond_slave_0\x00', 0x80000001}) 09:57:41 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:57:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000480)={r4}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000040)={r4, 0x7, 0x4}, &(0x7f0000000180)=0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl(r0, 0x100, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000000f000000000000a269a3506ff93770c956ef341f7a3a5cb96b32198edbc0a6f5129abf326e21eb840906caa355169c49460715df2980a203fe64575670378729040785b0b72dc93d6c39f4f214e5b6346b0bf617313d109c6a4fdaf3186c3a50a3883ddb97f090d0d92a3ab4"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x500290}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x114, 0x0, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsh0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffffffff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0xbd91a0755033e08d}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x114}, 0x1, 0x0, 0x0, 0x20002001}, 0x20048000) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='westwood\x00', 0x9) [ 2862.024315][ T3138] BPF:) [ 2862.051019][ T3138] BPF: [ 2862.066944][ T3157] BPF:[1] DATASEC a [ 2862.075311][ T3151] BPF:[1] FUNC a [ 2862.081234][ T3138] BPF:Invalid arg#1 [ 2862.092180][ T3157] BPF: 09:57:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400000002000000002e000018610000"], &(0x7f00000000c0)=""/235, 0xfffffd70, 0xdc, 0x8}, 0x15) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) accept$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x6628, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r3, 0x6628, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000480)={r6}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000003c0)={r6, 0x8}, &(0x7f00000007c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000001a00)={0x0, 0x9c, "a9e0f454dd90cc2024543175d46f809bfb485393012c2e19b6888b8deaa1569f521693601a691f4039949f3a1fa4d109520c5bed1a87bcd6ec3a6d5cb290ea80f83a922d885c2c9a5f04035166c7d60403f0e243640d5c8d2947b4c67efed33efbaffc2e130364cc8cf1429bc229d4fc8ae2a0e035232ac6e77e8e198cc3affe6b4c3747ce5783243d6f3c78ee5af31898a9afeedd002f6aedda2db2"}, &(0x7f0000001ac0)=0xa4) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r7, 0x84, 0x1b, &(0x7f0000000480)={r9}, &(0x7f0000000580)=0x8) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) r11 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r10, 0x84, 0x1b, &(0x7f0000000480)={r12}, &(0x7f0000000580)=0x8) [ 2862.112809][ T3138] BPF: [ 2862.112809][ T3138] [ 2862.113308][ T3160] BPF: Invalid name_offset:3 [ 2862.124847][ T3157] BPF:meta_left:0 meta_needed:24 [ 2862.144837][ T3151] BPF:type_id=0 [ 2862.150088][ T3157] BPF: [ 2862.150088][ T3157] 09:57:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x60}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2862.164428][ T3151] BPF: [ 2862.168358][ T3164] BPF: Invalid name_offset:3 [ 2862.205853][ T3151] BPF:vlen != 0 09:57:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:57:42 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000020000000000000001000006040000000300000000000000000047deb4ca2850e470742cba8ad07ea9ee19fd88598781843bacabea38b626d217697d18c7f1f14fe97fdafa87bf2d6f6d6d5083722479dae441f9d3e4bd7f4626f4aec7a284442284316f64cb014215fc5ab1b75e020c9b318aa90ee69e1dae75133730400321bcd7c6e0ab6bc7e082eaf1e4eceab2272748349e46fe20a579c44e4c46735ac91ba2ea50aeddab31d0dac74e03811f6ac183ba1cac38de5b58825bb02bf2d5de781e0259b44691"], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r2, r3, &(0x7f0000000000), 0xffe) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000000), 0x2) [ 2862.234489][ T3151] BPF: [ 2862.234489][ T3151] [ 2862.278298][ T3171] BPF:[1] DATASEC (anon) [ 2862.304787][ T3170] BPF:[1] FUNC_PROTO (anon) [ 2862.329342][ T3170] BPF:return=0 args=( [ 2862.341422][ T3171] BPF:size=0 vlen=0 [ 2862.345287][ T3171] BPF: [ 2862.360967][ T3170] BPF:0 (invalid-name-offset) [ 2862.380573][ T3170] BPF:, 4 (invalid-name-offset) [ 2862.384033][ T3171] BPF:vlen == 0 [ 2862.396453][ T3170] BPF:) [ 2862.401573][ T3171] BPF: [ 2862.401573][ T3171] [ 2862.410852][ T3184] BPF:[1] DATASEC a [ 2862.411592][ T3170] BPF: [ 2862.419905][ T3170] BPF:Invalid arg#1 [ 2862.425382][ T3179] BPF:Unsupported section found [ 2862.428354][ T3184] BPF: [ 2862.432652][ T3170] BPF: [ 2862.432652][ T3170] [ 2862.440582][ T3185] BPF:Unsupported section found [ 2862.446811][ T3184] BPF:meta_left:0 meta_needed:24 [ 2862.452190][ T3186] BPF:[1] FUNC_PROTO (anon) [ 2862.475538][ T3184] BPF: [ 2862.475538][ T3184] [ 2862.487453][ T3186] BPF:return=0 args=( 09:57:42 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000140000000efeffff00000000fffffffb010000060400000003000000000000000000"], &(0x7f0000000700)=""/220, 0x25, 0xdc, 0x8}, 0x20) [ 2862.528096][ T3186] BPF:0 (invalid-name-offset) 09:57:42 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2862.556651][ T3186] BPF:, 4 (invalid-name-offset) [ 2862.566522][ T3186] BPF:) [ 2862.569573][ T3186] BPF: [ 2862.576299][ T3186] BPF:Invalid arg#1 [ 2862.585789][ T3186] BPF: [ 2862.585789][ T3186] [ 2862.655754][ T3196] BPF:Invalid section offset 09:57:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x68}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2862.682536][ T3198] BPF:Invalid section offset [ 2862.690426][ T3197] BPF:[1] DATASEC a [ 2862.698974][ T3197] BPF: [ 2862.718141][ T3197] BPF:meta_left:0 meta_needed:24 [ 2862.735559][ T3158] BPF:[1] FUNC a [ 2862.740583][ T3197] BPF: [ 2862.740583][ T3197] [ 2862.750430][ T3158] BPF:type_id=0 [ 2862.757323][ T3158] BPF: [ 2862.770166][ T3158] BPF:vlen != 0 [ 2862.789051][ T3158] BPF: [ 2862.789051][ T3158] [ 2862.841910][ T3201] BPF:[1] FUNC_PROTO (anon) [ 2862.846553][ T3201] BPF:return=0 args=( [ 2862.850543][ T3201] BPF:0 (invalid-name-offset) [ 2862.891029][ T3201] BPF:, 4 (invalid-name-offset) 09:57:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x1, 'yam0\x00', 0x1}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xc}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:57:42 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0xffffffffffffff47, [@int={0xc, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x18, 0x6}]}}, &(0x7f00000001c0)=""/235, 0x2a, 0xeb, 0x8}, 0x20) r1 = accept(r0, 0x0, &(0x7f0000000140)) bind$isdn(r1, &(0x7f0000000180)={0x22, 0x7, 0x81, 0x6, 0xff}, 0x6) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) accept$alg(r2, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000000)) 09:57:42 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2862.912457][ T3201] BPF:) [ 2862.921253][ T3201] BPF: [ 2862.924123][ T3201] BPF:Invalid arg#1 [ 2862.935770][ T3201] BPF: [ 2862.935770][ T3201] [ 2862.953214][ T3171] BPF:[1] DATASEC (anon) [ 2862.965170][ T3206] BPF:Total section length too long [ 2862.974547][ T3208] BPF:[1] FUNC_PROTO (anon) [ 2862.978333][ T3171] BPF:size=0 vlen=0 [ 2862.979196][ T3208] BPF:return=0 args=( [ 2862.979207][ T3208] BPF:0 (invalid-name-offset) [ 2862.979217][ T3208] BPF:, 4 (invalid-name-offset) [ 2862.979222][ T3208] BPF:) [ 2862.979234][ T3208] BPF: [ 2862.989627][ T3207] BPF:[1] DATASEC a [ 2863.012937][ T3209] BPF:Total section length too long [ 2863.023682][ T3208] BPF:Invalid arg#1 [ 2863.031338][ T3171] BPF: [ 2863.036482][ T3208] BPF: [ 2863.036482][ T3208] [ 2863.043527][ T3171] BPF:vlen == 0 [ 2863.047010][ T3207] BPF: [ 2863.047022][ T3207] BPF:meta_left:0 meta_needed:24 [ 2863.047028][ T3207] BPF: [ 2863.047028][ T3207] 09:57:43 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2863.094527][ T3171] BPF: [ 2863.094527][ T3171] 09:57:43 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000180)=ANY=[@ANYRES32=r4, @ANYBLOB="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"], &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000080)={r4, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x10}}}, 0x0, 0xcb}, 0x90) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000300)={0xffffffffffffffff}) setsockopt$TIPC_CONN_TIMEOUT(r5, 0x10f, 0x82, &(0x7f0000000340)=0x1, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x0, 0x0, 0x0, 0xf}]}, {0x0, [0x5f, 0x5f, 0x30, 0x30]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') 09:57:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket(0xa, 0xa, 0x9) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) 09:57:43 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000000)={0x16, @local, 0x4e24, 0x4, 'sh\x00', 0x3f, 0x5291, 0x2d}, 0x2c) 09:57:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x6c}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2863.230620][ T3219] IPVS: Unknown mcast interface: yam0 [ 2863.250991][ T3222] BPF:[1] DATASEC a [ 2863.255127][ T3219] BPF:[1] FUNC a [ 2863.279742][ T3222] BPF: [ 2863.288467][ T3222] BPF:meta_left:0 meta_needed:24 [ 2863.293895][ T3219] BPF:type_id=0 [ 2863.296502][ T3229] BPF:[1] FUNC_PROTO (anon) [ 2863.303849][ T3228] BPF: Invalid name_offset:3 [ 2863.305874][ T3219] BPF: [ 2863.311470][ T3222] BPF: [ 2863.311470][ T3222] [ 2863.318492][ T3229] BPF:return=0 args=( [ 2863.326563][ T3228] IPVS: set_ctl: invalid protocol: 22 172.20.20.170:20004 [ 2863.328197][ T3219] BPF:vlen != 0 [ 2863.342809][ T3229] BPF:0 (invalid-name-offset) [ 2863.350712][ T3219] BPF: [ 2863.350712][ T3219] [ 2863.358805][ T3229] BPF:, 4 (invalid-name-offset) 09:57:43 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2863.378578][ T3230] IPVS: Unknown mcast interface: yam0 [ 2863.389465][ T3229] BPF:) [ 2863.393653][ T3232] BPF: Invalid name_offset:3 [ 2863.431594][ T3229] BPF: [ 2863.444471][ T3229] BPF:Invalid arg#1 [ 2863.461227][ T3229] BPF: [ 2863.461227][ T3229] [ 2863.471272][ T3234] BPF:[1] DATASEC (anon) 09:57:43 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x8}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:57:43 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xc}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x8c, r3, 0x4, 0x70bd28, 0x25dfdbfb, {}, [{{{{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{{{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{{{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) [ 2863.488220][ T3240] BPF:[1] DATASEC a [ 2863.494865][ T3241] BPF:[1] FUNC_PROTO (anon) [ 2863.521267][ T3234] BPF:size=0 vlen=0 [ 2863.525263][ T3234] BPF: [ 2863.526497][ T3241] BPF:return=0 args=( [ 2863.529632][ T3240] BPF: [ 2863.547610][ T3234] BPF:vlen == 0 [ 2863.561192][ T3234] BPF: [ 2863.561192][ T3234] [ 2863.566196][ T3240] BPF:meta_left:0 meta_needed:24 [ 2863.571291][ T3241] BPF:0 (invalid-name-offset) [ 2863.591135][ T3241] BPF:, 4 (invalid-name-offset) [ 2863.596136][ T3241] BPF:) [ 2863.598984][ T3241] BPF: [ 2863.615245][ T3253] BPF:[1] DATASEC (anon) [ 2863.620084][ T3241] BPF:Invalid arg#1 [ 2863.627859][ T3240] BPF: [ 2863.627859][ T3240] [ 2863.634460][ T3241] BPF: [ 2863.634460][ T3241] [ 2863.643533][ T3253] BPF:size=0 vlen=0 [ 2863.649893][ T3257] BPF:[1] ENUM (anon) [ 2863.655003][ T3256] BPF:[1] FUNC a [ 2863.662315][ T3257] BPF:size=4 vlen=1 [ 2863.669610][ T3256] BPF:type_id=0 [ 2863.677033][ T3255] BPF:[1] Invalid name_offset:8 [ 2863.678660][ T3253] BPF: [ 2863.688214][ T3256] BPF: [ 2863.691212][ T3257] BPF: 09:57:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x74}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:57:43 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2863.695953][ T3259] BPF:[1] Invalid name_offset:8 [ 2863.696951][ T3256] BPF:vlen != 0 [ 2863.705134][ T3253] BPF:vlen == 0 [ 2863.711113][ T3257] BPF:Invalid name [ 2863.718295][ T3253] BPF: [ 2863.718295][ T3253] [ 2863.723992][ T3256] BPF: [ 2863.723992][ T3256] [ 2863.731044][ T3257] BPF: [ 2863.731044][ T3257] [ 2863.763050][ T3260] BPF:[1] FUNC a 09:57:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000100)=0x6dc, 0x12) ioctl$EXT4_IOC_SETFLAGS(r0, 0x6628, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2863.796538][ T3267] BPF:[1] FUNC_PROTO (anon) 09:57:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9febda7a1c9b6f4d45df0fe5010018000000000000001400000014000000e3ffffff00000000010000060400"/56], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) 09:57:43 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000080)=0xca7, 0x4) [ 2863.827403][ T3267] BPF:return=0 args=( [ 2863.831654][ T3260] BPF:type_id=0 [ 2863.848509][ T3260] BPF: [ 2863.854269][ T3260] BPF:vlen != 0 [ 2863.857877][ T3260] BPF: [ 2863.857877][ T3260] [ 2863.868809][ T3267] BPF:0 (invalid-name-offset) [ 2863.874985][ T3267] BPF:, 4 (invalid-name-offset) [ 2863.916497][ T3275] BPF:[1] DATASEC a [ 2863.933130][ T3267] BPF:) [ 2863.936075][ T3267] BPF: [ 2863.946914][ T3275] BPF: [ 2863.966745][ T3275] BPF:meta_left:0 meta_needed:24 [ 2863.971744][ T3283] BPF:btf_header not found [ 2863.974290][ T3284] BPF:btf_header not found [ 2863.976485][ T3267] BPF:Invalid arg#1 [ 2863.997908][ T3285] BPF:[1] DATASEC (anon) [ 2864.001217][ T3275] BPF: [ 2864.001217][ T3275] [ 2864.009546][ T3285] BPF:size=0 vlen=0 [ 2864.010569][ T3267] BPF: 09:57:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0xff76, [@enum={0x0, 0x23be, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) 09:57:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xc}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2864.010569][ T3267] [ 2864.013932][ T3285] BPF: [ 2864.024394][ T3286] BPF: Invalid name_offset:3 [ 2864.042389][ T3287] BPF:[1] FUNC_PROTO (anon) [ 2864.050707][ T3287] BPF:return=0 args=( [ 2864.051800][ T3285] BPF:vlen == 0 09:57:44 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2864.071836][ T3287] BPF:0 (invalid-name-offset) [ 2864.101119][ T3285] BPF: [ 2864.101119][ T3285] [ 2864.115528][ T3287] BPF:, 4 (invalid-name-offset) [ 2864.145487][ T3287] BPF:) [ 2864.151567][ T3296] BPF:Total section length too long [ 2864.159133][ T3287] BPF: [ 2864.165682][ T3287] BPF:Invalid arg#1 [ 2864.173525][ T3298] BPF:[1] FUNC a [ 2864.181047][ T3298] BPF:type_id=0 [ 2864.185812][ T3287] BPF: [ 2864.185812][ T3287] 09:57:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7a}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2864.197793][ T3300] BPF:Total section length too long [ 2864.197951][ T3298] BPF: [ 2864.217701][ T3298] BPF:vlen != 0 [ 2864.223471][ T3298] BPF: [ 2864.223471][ T3298] [ 2864.231417][ T3301] BPF:[1] DATASEC a [ 2864.241574][ T3301] BPF: [ 2864.260463][ T3301] BPF:meta_left:0 meta_needed:24 09:57:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") sendto(r0, &(0x7f0000000080)="ece2e6b3680a8c0c2126af5666fe91d09b46e4b651f4f71062bd4a6598c81e3ead7e78e0820227af15490c1846b435acc5fd66728bc3c90d0706710913d82958e1c01ed1a3d218db588238fd8fac460c858d6665b3aa4d44f9f105024dff0e1d8d16265f7b0605b9edb4d72bc4a619388a981a27f716d8e8bf3c64fc38b1faa31db0a9008647f163e763ff248a82cd2cebe3c57aeb36fd343b118df88b22e11666266766f447bcf81b96d0a2527001411ccbdd333457d2c195b29afe5b407ff126028119ac", 0xc5, 0x4000000, &(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @loopback}, 0x2, 0x1, 0x0, 0x3}}, 0x80) r1 = socket$inet(0x2, 0xf2d60bd90ba8986e, 0x69) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000200)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010006000000000000000c0000000c00000003000000010000000200000c00000800000000"], &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) socket$netlink(0x10, 0x3, 0x2) 09:57:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x6628, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000001c0), 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) getpeername(0xffffffffffffffff, &(0x7f00000005c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000640)=0x80) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000680)=0x3ff, 0x4) r4 = accept$alg(r2, 0x0, 0x0) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000002c0), 0xfefe) sendfile(r4, r5, &(0x7f0000000000), 0xffe) writev(r5, &(0x7f0000000180)=[{&(0x7f0000000080)="4f81aa682c2e81b17dc4c4644ce5aeab6c92a83a12363fcdfa3b1e915a36e82bc0f350eb2ec1d0de53dd6617086990eab3e6e12c57d1daa2fbfea9528e1193a0fc6eb34c456b2fc2bf6d5b75f1ec8d621963d89f7e33b7f0fc1b3122cc51fd2273665ad5e493669a92b01587d3296d42e482039da3f6c7ad712d1b5c70087070967e52765edea6d853c8b461e9c046c2e1f68a01c1df500596a3f7708da965a037f06f551d346e20428c749ea0be30a2f011c5a79d5d0ffa7d2db3a58c1fdad9983a312ee28f631c5a40f32bfc6adf549de9193d1638ef34ee80d60b5b01a1e3a6888a7de8391a14157bc1c3d6bb521af8d89e626e1dc0", 0xf7}], 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@typedef={0xd, 0x0, 0x0, 0x8, 0x5}]}, {0x0, [0x5f, 0x0]}}, &(0x7f0000000700)=""/220, 0x30, 0xdc, 0x8}, 0x1a3) [ 2864.310336][ T3301] BPF: [ 2864.310336][ T3301] [ 2864.342931][ T3305] BPF:[1] FUNC_PROTO (anon) [ 2864.365606][ T3305] BPF:return=0 args=( [ 2864.377629][ T3305] BPF:0 (invalid-name-offset) [ 2864.392765][ T3305] BPF:, 4 (invalid-name-offset) [ 2864.400137][ T3309] BPF:Unsupported section found 09:57:44 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2864.423377][ T3305] BPF:) [ 2864.428173][ T3309] BPF:Unsupported section found [ 2864.434458][ T3305] BPF: [ 2864.439652][ T3305] BPF:Invalid arg#1 [ 2864.458355][ T3305] BPF: [ 2864.458355][ T3305] 09:57:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="9f03df1d41ca00000003001000010000000200000c000000000061000000000000000000000000c7bfff46a58e574cf663a931f9b0c22ca5babc8b3591d48a124b8e1ccf6f8f866aaed09bbdd962d2b41914d2ee42266925bfb1266388f9ffffffffffffffc45826e14b7a28f2cefd5bf67aa1253b5ba053481e242c9a0b7fa6e8e5ddf9a0e18ec63a58e41f2d5e41e285df433acaa1780b3246cf3dca032b108112d32411c96f5128dc7c5ef4e149f7f35e99d0ac06440c0903384a28dc86c45772ab681a6a7a1fd24f09ed99ac4eeed69b7c9a283445083c990b87863cc5"], &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2864.478650][ T3313] BPF:[1] FUNC_PROTO (anon) [ 2864.511107][ T3313] BPF:return=0 args=( [ 2864.526820][ T3313] BPF:0 (invalid-name-offset) [ 2864.544009][ T3315] BPF:[1] Invalid name_offset:13 [ 2864.554479][ T3313] BPF:, 4 (invalid-name-offset) [ 2864.571022][ T3313] BPF:) [ 2864.574002][ T3313] BPF: [ 2864.596899][ T3313] BPF:Invalid arg#1 [ 2864.602282][ T3321] BPF:btf_header not found [ 2864.614371][ T3313] BPF: [ 2864.614371][ T3313] 09:57:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xda}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2864.618175][ T3319] BPF:[1] DATASEC a [ 2864.626233][ T3319] BPF: [ 2864.629327][ T3324] BPF:btf_header not found [ 2864.639663][ T3319] BPF:meta_left:0 meta_needed:24 [ 2864.654246][ T3319] BPF: [ 2864.654246][ T3319] [ 2864.735359][ T3330] BPF:[1] FUNC_PROTO (anon) [ 2864.737767][ T3286] BPF: Invalid name_offset:3 [ 2864.757315][ T3330] BPF:return=0 args=( [ 2864.775526][ T3330] BPF:0 (invalid-name-offset) 09:57:44 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0x9) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r2, r3, &(0x7f0000000000)=0x1, 0xffe) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000240)={0xfffff4b0, 0x3}, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000440)={{0x3, 0x0, @descriptor="c9b74985a9a40d50"}, 0x142, [], "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"}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018f3e2000000040000000000000000000200000000000000010000060400000003000000000000000000"], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) 09:57:44 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2864.809746][ T3330] BPF:, 4 (invalid-name-offset) [ 2864.817206][ T3285] BPF:[1] DATASEC (anon) [ 2864.828431][ T3330] BPF:) [ 2864.833673][ T3285] BPF:size=0 vlen=0 [ 2864.838750][ T3330] BPF: [ 2864.851994][ T3330] BPF:Invalid arg#1 [ 2864.869414][ T3285] BPF: [ 2864.873592][ T3330] BPF: [ 2864.873592][ T3330] [ 2864.894158][ T3285] BPF:vlen == 0 [ 2864.894445][ T3336] BPF:[1] DATASEC a [ 2864.899720][ T3337] BPF:[1] FUNC_PROTO (anon) [ 2864.910849][ T3336] BPF: [ 2864.911494][ T3337] BPF:return=0 args=( [ 2864.917735][ T3285] BPF: [ 2864.917735][ T3285] [ 2864.922491][ T3336] BPF:meta_left:0 meta_needed:24 [ 2864.931048][ T3337] BPF:0 (invalid-name-offset) [ 2864.935873][ T3337] BPF:, 4 (invalid-name-offset) [ 2864.938750][ T3336] BPF: [ 2864.938750][ T3336] [ 2864.958300][ T3337] BPF:) [ 2864.964651][ T3337] BPF: 09:57:44 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xe, 0x800) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") ioctl$sock_ifreq(r2, 0x8919, &(0x7f00000003c0)={'teql0\x00', @ifru_names='syzkaller1\x00'}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r3, 0x6628, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r4, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r4, 0x6628, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x40, 0x0, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffff7}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1400}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000001}, 0x40) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xec, 0x31, 0x800, 0x70bd27, 0x25dfdbfd, {0x1d}, [@generic="605fee8159765c3f574eba321aeacf4604f2db6162d68cd9368a12478ac0486023d4ac53c865a8abbd74375ed17199f42489216614ede20500abeb2ef851bac615d414", @typed={0x8, 0x21, @ipv4=@multicast1}, @generic="f4a48d2396672e2727eb3cbc394b5bb3b5dd55687de0a436a5d88df43f5e567e9974999c4f3b6ee3069e50120aea7f2ef87f8f4b31bcc747f67785a798f3815d17a85eb60a2af6dd047d9482e078f2e7a48b859eb0939d26c401f713f8b2d4b0bee3a36ccdb2e53547ebbb8b0f16937eb629b2dec77e56933797d61f12f0b41ca6cd8cb84e18b7d97d5d8158"]}, 0xec}, 0x1, 0x0, 0x0, 0x4000080}, 0x18000) close(r1) r5 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000440)={r5}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:57:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000003000000010000000213000c00000000006100"], &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:57:44 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2864.971005][ T3337] BPF:Invalid arg#1 [ 2864.986942][ T3337] BPF: [ 2864.986942][ T3337] 09:57:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x300}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2865.038403][ T3340] BPF:[1] FUNC a [ 2865.047914][ T3340] BPF:type_id=0 [ 2865.081316][ T3340] BPF: [ 2865.089500][ T3344] BPF:btf_header not found [ 2865.094673][ T3340] BPF:vlen != 0 [ 2865.119746][ T3340] BPF: [ 2865.119746][ T3340] [ 2865.136115][ T3350] BPF:[1] DATASEC a [ 2865.162353][ T3355] BPF:[1] FUNC a [ 2865.169943][ T3356] BPF:[1] FUNC_PROTO (anon) [ 2865.172817][ T3350] BPF: [ 2865.179805][ T3355] BPF:type_id=0 [ 2865.191137][ T3350] BPF:meta_left:0 meta_needed:24 [ 2865.196115][ T3350] BPF: [ 2865.196115][ T3350] [ 2865.201512][ T3355] BPF: [ 2865.204283][ T3355] BPF:vlen != 0 09:57:45 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) accept$alg(r1, 0x0, 0x0) getsockname(r1, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000000)=0x80) setsockopt$inet6_udp_int(r2, 0x11, 0xb, &(0x7f0000000140)=0x4, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x22d6, 0x0, 0x6, 0x4, [{0x3}]}]}, {0x0, [0x30, 0x61, 0x0]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2865.211106][ T3356] BPF:return=0 args=( [ 2865.214028][ T3355] BPF: [ 2865.214028][ T3355] [ 2865.215121][ T3356] BPF:0 (invalid-name-offset) [ 2865.215132][ T3356] BPF:, 4 (invalid-name-offset) [ 2865.215137][ T3356] BPF:) [ 2865.215143][ T3356] BPF: [ 2865.215156][ T3356] BPF:Invalid arg#1 [ 2865.231514][ T3315] BPF:[1] Invalid name_offset:13 [ 2865.248007][ T3356] BPF: [ 2865.248007][ T3356] [ 2865.306759][ T3364] BPF:[1] FUNC_PROTO (anon) 09:57:45 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) ioctl(r1, 0x6, &(0x7f0000000280)="c6059b68b91305002146009cb0a0a12c0dfecb5d3c7b21c6ae6053615dae629d8491ddb1ab2ce624fc1041c2c542cdbfa8bf6bf3376586e631381ca1000056859a040292970b07dacc99400c8c27affb1954a6b43f8d798733230ddb8b6a3f50ada32eb26c4ed361919d747c080000006c09d3a52a44de68fcaa128c8f5ea8902a63e99200000000c12c792fed88f653e2ad59c1f7da42ddc7276a5b7738002bb43a801b5bc1c5f0d1000000000000000000") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0066af97930000010000000200000c00000000006100"], &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x6628, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r2, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080)=0x40000, 0x12) ioctl$EXT4_IOC_SETFLAGS(r3, 0x6628, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f0000000100)=0x80000000, 0x4) [ 2865.331160][ T3364] BPF:return=0 args=( [ 2865.335265][ T3364] BPF:0 (invalid-name-offset) [ 2865.363534][ T3367] BPF:Invalid string section [ 2865.368264][ T3364] BPF:, 4 (invalid-name-offset) 09:57:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000200000000000000000000060400000000004e18e3881b21783520622c3d6a4fd9e8d5e0ed0d1f90d321022af7a1cebd4788872a7116f099c890a74d"], &(0x7f00000000c0)=""/228, 0x26, 0xffffffffffffffa6, 0x8}, 0x20) 09:57:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x0, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2865.378287][ T3370] BPF:[1] DATASEC (anon) [ 2865.385553][ T3364] BPF:) [ 2865.418966][ T3370] BPF:size=0 vlen=0 09:57:45 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)={0xfffffffe, 0x0, 0x0, 0x800}) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x3, 0x5, 0x9, 0x4, 0x5, 0x91, 0x2, 0x3, 0x7, 0x26, 0x80}, 0xb) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400000002000000000000000100000604000000030000000000000000007f326bc8253fef8b873014a8fa47f515275578857919d008bc5eb66c1e776eba75219d56fbb9d2906436431cad"], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080), 0x15d4b87) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r5 = accept$alg(r4, 0x0, 0x0) r6 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r6, &(0x7f00000002c0), 0xfefe) sendfile(r5, r6, &(0x7f0000000000), 0xffe) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000100)={'ip6erspan0\x00', 0x1000}) ioctl$EXT4_IOC_SETFLAGS(r3, 0x6628, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000280), &(0x7f0000000300)=0x4) bind$packet(r6, &(0x7f00000001c0)={0x11, 0x18, r7, 0x1, 0x20}, 0x14) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback, 0x40000001}, 0x1c) [ 2865.432564][ T3364] BPF: [ 2865.444473][ T3364] BPF:Invalid arg#1 [ 2865.452953][ T3375] BPF:Invalid section offset [ 2865.457928][ T3370] BPF: [ 2865.468407][ T3364] BPF: [ 2865.468407][ T3364] [ 2865.474722][ T3370] BPF:vlen == 0 [ 2865.513427][ T3370] BPF: [ 2865.513427][ T3370] 09:57:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x500}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2865.552225][ T3377] BPF:[1] DATASEC a [ 2865.556200][ T3377] BPF: [ 2865.579728][ T3377] BPF:meta_left:0 meta_needed:24 [ 2865.601096][ T3377] BPF: [ 2865.601096][ T3377] [ 2865.678020][ T3388] BPF: Invalid name_offset:3 09:57:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000000c0)=0x7f, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010000000000000000001400000014000000020000000000000001000006b300"/46], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) 09:57:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x0, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2865.698421][ T3389] BPF:[1] FUNC_PROTO (anon) [ 2865.715445][ T3389] BPF:return=0 args=( [ 2865.771048][ T3389] BPF:0 (invalid-name-offset) [ 2865.801050][ T3389] BPF:, 4 (invalid-name-offset) [ 2865.811438][ T3389] BPF:) [ 2865.828194][ T3389] BPF: [ 2865.849603][ T3393] BPF:Invalid magic [ 2865.858230][ T3389] BPF:Invalid arg#1 [ 2865.859197][ T3395] BPF:[1] DATASEC a [ 2865.878570][ T3389] BPF: [ 2865.878570][ T3389] [ 2865.880366][ T3395] BPF: [ 2865.886551][ T3396] BPF:Invalid magic [ 2865.892120][ T3395] BPF:meta_left:0 meta_needed:24 [ 2865.905128][ T3395] BPF: [ 2865.905128][ T3395] [ 2865.917505][ T3397] BPF:[1] FUNC_PROTO (anon) [ 2865.939080][ T3397] BPF:return=0 args=( [ 2865.958959][ T3397] BPF:0 (invalid-name-offset) [ 2865.977949][ T3397] BPF:, 4 (invalid-name-offset) [ 2866.007141][ T3397] BPF:) [ 2866.014641][ T3397] BPF: [ 2866.021149][ T3397] BPF:Invalid arg#1 [ 2866.046717][ T3397] BPF: [ 2866.046717][ T3397] [ 2866.094556][ T3370] BPF:[1] DATASEC (anon) [ 2866.111852][ T3370] BPF:size=0 vlen=0 [ 2866.142541][ T3370] BPF: [ 2866.150075][ T3370] BPF:vlen == 0 [ 2866.158448][ T3370] BPF: [ 2866.158448][ T3370] 09:57:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x0, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:57:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="91eb0100180000000000000014000000140000000200000000000000010000060400"/46], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0xa3, "05df1b02ed9a747508d11ac853b0f01e85b65e36a8993b37741095345469b6357338818ad0cf2896187f1be48ce8585188cb61303da38e3c77df995b259599053fef444f651d1c153625c3196da5158d7c3c5867591045d3e7b703c9d176167903ac4fb12b941a725ee0eaf77919dc8154624738c23d8838b26d3ab855f5b5b22af30d85af2b12512430e8b1df9c11be49933ec2e762000d7cf06efbe7948d6a430162"}, &(0x7f00000001c0)=0xab) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e20, 0x2, @mcast1, 0x77}}, [0x5, 0x7fffffff, 0x8001, 0xebb, 0x9, 0x101, 0x9df, 0x5, 0xffffffff, 0x6, 0x1, 0x3, 0xffffffffffffffe0, 0x5, 0x800]}, &(0x7f0000000300)=0x100) 09:57:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x600}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:57:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x6628, 0x0) r1 = accept4$netrom(r0, &(0x7f0000000080)={{0x3, @rose}, [@remote, @default, @remote, @netrom, @null, @netrom, @null]}, &(0x7f0000000100)=0x48, 0x800) bind(r1, &(0x7f0000000140)=@in={0x2, 0x4e20, @loopback}, 0x80) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r3, 0x6628, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, &(0x7f0000000200), &(0x7f0000000240)=0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r4, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r4, 0x6628, 0x0) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f00000001c0)={0x1f, 0x1, 0x6, 0x6}, 0x10) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2866.249863][ T3380] BPF:Invalid section offset [ 2866.272340][ T3406] BPF:Invalid magic [ 2866.275968][ T3408] BPF:[1] FUNC_PROTO (anon) [ 2866.283807][ T3407] BPF:[1] DATASEC a [ 2866.294461][ T3407] BPF: [ 2866.298291][ T3408] BPF:return=0 args=( [ 2866.305546][ T3407] BPF:meta_left:0 meta_needed:24 [ 2866.312909][ T3408] BPF:0 (invalid-name-offset) [ 2866.319653][ T3407] BPF: 09:57:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000186a0000000c0000000c00000103210000010000000200000c00000000006100"], &(0x7f0000000180)=""/227, 0x27, 0xe3, 0x8}, 0x20) [ 2866.319653][ T3407] [ 2866.327296][ T3408] BPF:, 4 (invalid-name-offset) [ 2866.336932][ T3408] BPF:) [ 2866.346908][ T3408] BPF: [ 2866.370169][ T3408] BPF:Invalid arg#1 [ 2866.374704][ T3388] BPF: Invalid name_offset:3 [ 2866.378979][ T3408] BPF: [ 2866.378979][ T3408] 09:57:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2866.439133][ T3415] BPF:[1] FUNC_PROTO (anon) 09:57:46 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) accept$alg(r1, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}}, &(0x7f00000000c0)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2866.489114][ T3415] BPF:return=0 args=( [ 2866.523947][ T3419] BPF:[1] DATASEC a [ 2866.530258][ T3420] BPF:[1] DATASEC (anon) [ 2866.538203][ T3419] BPF: [ 2866.544670][ T3419] BPF:meta_left:0 meta_needed:24 [ 2866.545121][ T3415] BPF:0 (invalid-name-offset) [ 2866.554596][ T3420] BPF:size=0 vlen=0 [ 2866.559674][ T3419] BPF: [ 2866.559674][ T3419] [ 2866.584811][ T3420] BPF: [ 2866.598989][ T3415] BPF:, 4 (invalid-name-offset) [ 2866.604578][ T3415] BPF:) [ 2866.607441][ T3415] BPF: [ 2866.628973][ T3415] BPF:Invalid arg#1 09:57:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2866.629183][ T3420] BPF:vlen == 0 [ 2866.646460][ T3415] BPF: [ 2866.646460][ T3415] [ 2866.652378][ T3423] BPF:btf_header not found [ 2866.662760][ T3420] BPF: [ 2866.662760][ T3420] 09:57:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x700}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2866.733214][ T3426] BPF:btf_header not found [ 2866.788280][ T3429] BPF: Invalid name_offset:3 [ 2866.807906][ T3432] BPF: Invalid name_offset:3 [ 2866.817690][ T3433] BPF:[1] DATASEC a [ 2866.831380][ T3433] BPF: 09:57:46 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, &(0x7f00000000c0)=0x1c) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) 09:57:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xfffffffffffffe1a, 0x3, [@union={0x1, 0x2, 0x0, 0xc}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2866.834372][ T3433] BPF:meta_left:0 meta_needed:24 [ 2866.855562][ T3434] BPF:[1] FUNC_PROTO (anon) [ 2866.856589][ T3433] BPF: [ 2866.856589][ T3433] [ 2866.876782][ T3434] BPF:return=0 args=( [ 2866.900369][ T3434] BPF:0 (invalid-name-offset) [ 2866.936841][ T3434] BPF:, 4 (invalid-name-offset) 09:57:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2866.959740][ T3434] BPF:) [ 2866.975805][ T3434] BPF: [ 2866.990517][ T3438] BPF: Invalid name_offset:3 [ 2866.993744][ T3434] BPF:Invalid arg#1 [ 2867.000244][ T3434] BPF: [ 2867.000244][ T3434] [ 2867.020524][ T3439] BPF:[1] FUNC_PROTO (anon) [ 2867.042869][ T3442] BPF: Invalid name_offset:3 [ 2867.058967][ T3439] BPF:return=0 args=( [ 2867.063562][ T3410] BPF:Invalid magic 09:57:47 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x1000000000021, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) r3 = accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x0, @hyper}, 0x10, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000001c0)={'bridge_slave_0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="0300000007133290132a0322ec1d70030353775e53eb45f2caa6fe295559123fe3478a386c95b649852dec45b614166c702707241f02c2f2eca736f689d4681013322b20315e78a33f14a22d38a3adec1489fa9d9538d9cd06d026816a06c745e4683fd18597e0e35ada83271c74f67229b49b4847db8712d67b6676e54a0b04dd7eb22a63ce202157bb2a408662aea52d6329d3a5edfed5bf0a8a09546dfc43c185ca8676fdd9cab3eab192d57b864a0300000005000000470000000000000029000000"]}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x4}]}}, &(0x7f0000000700)=""/220, 0x26, 0x60, 0x8}, 0x20) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r5 = accept$alg(r4, 0x0, 0x0) r6 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r6, &(0x7f00000002c0), 0xfefe) sendfile(r5, r6, &(0x7f0000000000), 0xffe) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f0000000200)={{0x1, 0x0, @reserved="24af3cb12f698b8af80a82aa2e2f97f971215c71cb09979fddba23dd78b06b4c"}}) [ 2867.091643][ T3445] BPF:[1] DATASEC a [ 2867.097185][ T3439] BPF:0 (invalid-name-offset) [ 2867.105862][ T3445] BPF: [ 2867.110147][ T3441] BPF:Invalid section offset [ 2867.115940][ T3445] BPF:meta_left:0 meta_needed:24 [ 2867.119598][ T3439] BPF:, 4 (invalid-name-offset) [ 2867.123193][ T3445] BPF: [ 2867.123193][ T3445] 09:57:47 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01000000000000000000030000001400010010000100756470d1866f94a6490fef3a"], 0x28}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x8c, r2, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9b}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x20f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x940}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4000000}, 0x200448c0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) 09:57:47 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2867.145515][ T3439] BPF:) [ 2867.150992][ T3439] BPF: [ 2867.155278][ T3446] BPF:Invalid section offset [ 2867.166319][ T3439] BPF:Invalid arg#1 [ 2867.170242][ T3439] BPF: [ 2867.170242][ T3439] [ 2867.282018][ T3420] BPF:[1] DATASEC (anon) [ 2867.318950][ T3452] BPF:[1] DATASEC a [ 2867.325052][ T3420] BPF:size=0 vlen=0 [ 2867.345483][ T3420] BPF: [ 2867.357855][ T3420] BPF:vlen == 0 [ 2867.365629][ T3452] BPF: [ 2867.390666][ T3420] BPF: [ 2867.390666][ T3420] [ 2867.396978][ T3452] BPF:meta_left:0 meta_needed:24 [ 2867.407527][ T3452] BPF: [ 2867.407527][ T3452] 09:57:47 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x10, 0x0, 0x0, 0xb, 0x5}]}}, &(0x7f0000000700)=""/216, 0xfffffffffffffee9, 0xdc, 0xa}, 0x20) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r2, r3, &(0x7f0000000000), 0xffe) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000100)=0x68) 09:57:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) setsockopt$packet_int(r1, 0x107, 0x13, &(0x7f0000000080)=0x7fffffff, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x6628, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000000c0)={r0, 0x81, 0x4, "54ee3d6dbc0db1ce0ad1afc2d83f8a2deff40f36f5f67a"}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c1b00000c00000003000000010000000200000c00000000006100"], &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:57:47 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xa00}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:57:47 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2867.516798][ T3458] Enabling of bearer rejected, illegal name [ 2867.574453][ T3464] Enabling of bearer rejected, illegal name [ 2867.617140][ T3466] BPF:[1] FUNC_PROTO (anon) [ 2867.627073][ T3467] BPF:[1] DATASEC a [ 2867.640117][ T3469] BPF:Total section length too long [ 2867.644033][ T3467] BPF: [ 2867.657531][ T3466] BPF:return=0 args=( 09:57:47 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2867.671218][ T3467] BPF:meta_left:0 meta_needed:24 [ 2867.681098][ T3466] BPF:0 (invalid-name-offset) [ 2867.686023][ T3466] BPF:, 4 (invalid-name-offset) [ 2867.697419][ T3467] BPF: [ 2867.697419][ T3467] [ 2867.700789][ T3466] BPF:) [ 2867.709941][ T3466] BPF: [ 2867.727892][ T3466] BPF:Invalid arg#1 09:57:47 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2867.764061][ T3466] BPF: [ 2867.764061][ T3466] [ 2867.780720][ T3475] BPF:[1] ENUM (anon) [ 2867.791336][ T3476] BPF:[1] FUNC_PROTO (anon) [ 2867.823421][ T3475] BPF:size=4 vlen=1 [ 2867.851084][ T3475] BPF: [ 2867.859159][ T3476] BPF:return=0 args=( [ 2867.871253][ T3475] BPF:Invalid name [ 2867.875130][ T3475] BPF: [ 2867.875130][ T3475] 09:57:47 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000001c0)={0x0, 0x4a3f, &(0x7f0000000180)={&(0x7f0000000380)={0x38, r2, 0x105, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r2, 0x10, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x4107, 0x0, {0x1c, 0x18, {0x5, @bearer=@l2={'ib', 0x3a, 'veth1_to_bridge\x00'}}}}}, 0x38}, 0x1, 0x0, 0x0, 0x40005}, 0x40) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:57:47 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000ffff2d0000000000000b0200"/38], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2867.908075][ T3476] BPF:0 (invalid-name-offset) [ 2867.915474][ T3481] BPF:[1] DATASEC a [ 2867.924499][ T3476] BPF:, 4 (invalid-name-offset) [ 2867.941796][ T3476] BPF:) [ 2867.957741][ T3481] BPF: [ 2867.960563][ T3481] BPF:meta_left:0 meta_needed:24 [ 2867.981184][ T3476] BPF: [ 2867.984011][ T3476] BPF:Invalid arg#1 [ 2867.987845][ T3476] BPF: [ 2867.987845][ T3476] [ 2867.996178][ T3481] BPF: [ 2867.996178][ T3481] 09:57:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1c00}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2868.053447][ T3488] Started in network mode [ 2868.080037][ T3488] Own node identity , cluster identity 4711 [ 2868.125731][ T3488] Failed to obtain node identity [ 2868.148003][ T3493] BPF:[1] DATASEC (anon) [ 2868.152925][ T3494] BPF:Invalid section offset [ 2868.169449][ T3488] Enabling of bearer rejected, failed to enable media [ 2868.187422][ T3489] BPF:Invalid section offset [ 2868.191623][ T3496] BPF:[1] FUNC_PROTO (anon) 09:57:48 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000014000000140000090000000000000000010000060400000003000000000000000000cd1a8eddbe52520b94c243d5978d979f71b4b87f00754cedfae553dda6736bb39e7f4932ea57"], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 09:57:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2868.204443][ T3496] BPF:return=0 args=( [ 2868.215424][ T3496] BPF:0 (invalid-name-offset) [ 2868.225997][ T3496] BPF:, 4 (invalid-name-offset) [ 2868.231251][ T3493] BPF:size=0 vlen=0 [ 2868.235564][ T3493] BPF: [ 2868.248305][ T3496] BPF:) 09:57:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01003000000000000000010000060400"/30], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2868.254803][ T3496] BPF: [ 2868.261111][ T3496] BPF:Invalid arg#1 [ 2868.266299][ T3493] BPF:vlen == 0 [ 2868.273489][ T3496] BPF: [ 2868.273489][ T3496] [ 2868.284398][ T3493] BPF: [ 2868.284398][ T3493] [ 2868.291193][ T3499] BPF:[1] DATASEC a [ 2868.295577][ T3499] BPF: [ 2868.298355][ T3499] BPF:meta_left:0 meta_needed:24 [ 2868.307133][ T3500] BPF:[1] FUNC_PROTO (anon) [ 2868.320526][ T3499] BPF: [ 2868.320526][ T3499] [ 2868.351812][ T3500] BPF:return=0 args=( [ 2868.365116][ T3469] BPF:Total section length too long 09:57:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2868.394745][ T3500] BPF:0 (invalid-name-offset) [ 2868.398481][ T3503] BPF:btf_header not found 09:57:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x8, 0x2, 0x80) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000480)={r4}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000004dc0)=@assoc_id=r4, &(0x7f0000004e00)=0x4) r7 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r7, 0x84, 0x0, &(0x7f0000000500)={r5, 0x9, 0x7ff, 0x1}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000004e40)={r6, @in6={{0xa, 0x4e20, 0x3, @remote, 0x4}}, 0x9, 0x7, 0x4e5, 0x7fff, 0x2}, &(0x7f0000004f00)=0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r8, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r8}) setsockopt$inet6_icmp_ICMP_FILTER(r9, 0x1, 0x1, &(0x7f00000000c0)={0x4}, 0x4) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r10, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r10, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r10, 0x6628, 0x0) setsockopt$CAIFSO_REQ_PARAM(r10, 0x116, 0x80, &(0x7f00000005c0)="113b250399ada4e40c0554974803a8e4b0b6f33256184c0d94d82e800f1e917ec27f2402a2f2bcb86ac7b3124632d70cba7f526218f880a13361f9121defdce0a249259919725e52b82c621dcd0e0e95f8ab588055730f44ccada40e40a973e93cc4edcbda847a875723a455a355a7b4328ede9cea93b1c9c72f77b9162e3f600dd961d62a6b084395ac89a7899e5ba7cdf1d6f19328480cbb5ddafc384741b1203ee2d098e00efc21ac4dcebe30af069298dfb06be534d57fa5564b6a5baf01ba67b3ae9c8a763c0e94041fdbc5", 0xce) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r11, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)=@newsa={0x10d, 0x10, 0x40d, 0x0, 0x0, {{@in=@dev, @in=@initdev}, {@in6=@loopback, 0x0, 0x6c}, @in6=@ipv4={[], [], @multicast2}, {}, {}, {}, 0x0, 0x0, 0xa}, [@replay_val={0x10}, @algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x148}}, 0x0) r12 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r12, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") setsockopt$inet_group_source_req(r12, 0x0, 0x2b, &(0x7f0000000100)={0x1ff, {{0x2, 0x4e23, @multicast1}}, {{0x2, 0x4e23, @multicast2}}}, 0x108) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)=""/220, 0xfb, 0xdc, 0x8}, 0x20) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r9, 0x84, 0x1c, &(0x7f0000000240), &(0x7f0000000280)=0x4) [ 2868.471580][ T3500] BPF:, 4 (invalid-name-offset) [ 2868.484056][ T3508] BPF:btf_header not found [ 2868.500229][ T3500] BPF:) [ 2868.512852][ T3510] BPF:[1] DATASEC a 09:57:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x6628, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) writev(r2, &(0x7f0000000600)=[{&(0x7f00000000c0)="8ea2eb005d6102e99f059c0e947221848f70f924c58a0b6e5352610e97a63f2b5be3c05445b79550e3dc534f056a4e51b317f6b66cc17d5535", 0x39}, {&(0x7f0000000100)="deecadc63de411f5fbce723464acb1ca792c8c8f8effa2b22c1938e4317a75005e31c106f2aa51c67f43ffa21238ff2a794d0e1443d7d4b074aa17d58cc4ad67b249a8", 0x43}, {&(0x7f0000000180)="85e020e64a5137ec7489fad8daa869522b8ed6588477fce56b2c375fc26d056eb10b9482c72fa58e0cf32a9fee9d4a4e9e31226cb7b90bf205b3dde6a4505a6a9236387398525535bb049e9516dce071d5615cc8ffae20a526ded214746e1e63bf7d8064e65fbf34bc139f819b3738fe8012e64f0837d93e1d4a1d049af9132501d9d6f1b229db6fb0cda27230dd31ca68da1feb153794875049403821ac04439b2269a9f3fc088d09db3437e2a1af136ef48546db1d99b125996b6a882b76a52f2c69f7cb4c895ffba762c5f3b46f60da9159d7086a6e7747504fb2c04f0625aacfe0ca290fb6998dce6e723d512cad1626c5a70c2d53036b1ffdd3332f89", 0xff}, {&(0x7f0000000280)="e040c11fda27c3f1e0227aa47fbc5024f767541253001b554c2bd15b75cd37db709886b851073be3c53692ab31f13cbed52423cb7d904f5efc6c9c10a6d4f313e6f1aea909b0104d78144b954cc201603a643d77a2cff4dd763531d3aef0f532879c45a492cfd30cfcf377dd7578f160e74da9a5d10b0fa75b72ef29b92a76d7ead8f185b033b655f9b41f497c7662488aa35409ce26f8432bc82916d0a60108c6ff9d4585fd45be59ba5262e843491dc914ab0cf112a49d5d24ed280970148626e8245e8119ae09e07df07de5ab9369d3dfeadf9c9cedc78720fe81575b6137f35cc0a8700b85dcc37037", 0xeb}, {&(0x7f0000000440)="4a7059ec397d6118a72475ae9d9935ed015cde5bf8f00aa75271894b24e6477ff54bac5d95f6411e6aa2dd8de8b88891b24cf2699cb8bf05cb9482d9bb605a178063f5a97cb832c7089915873c855682b7bc02d5c736047dbbc8ac0b81dfe77a8467befdc73a6db717c297201fa194d2a3214684b575641758eeb550de9a26da7ecc8b0b144289fdfb0b6bbf607c4c278485e2ae7c4f33ddfe3a4749103978575c9844a192fc78b6e7943b9e057ab40fac9bbb23f6a93e8a2a96d842a50a88a6085ed1c6adbdebabdb18d2cd2871c6a8c0c981b0736a40ad26431ff85c26268a82fad52f20fe9c9e63cc0e7b7604a2e6856a5b8508c64e4c698f39b8fe2f4b", 0xff}, {&(0x7f0000000380)="2209935530c055c614e41c3c935c22b41a4de8410b6af3dc5c574f4daca3e187a3b97991a22f40bedb12769b8c76ac5e4278aa1e553cc5cd67d042581963230b23fbd30b2f06561a474329c18605e7602d1fb83351bf95760c52d969326ca97d640f021b39709cb89bdf3a0a1ec56565a87f1da16231a9f8e412c59f5ee5f69a", 0x80}, {&(0x7f0000000540)="09757f6ca51a87ac53675db6ef6411c3664ac4e1c141fe6a926d88e55aaa067afadf823cfba6e359b60d6b6b4289f24b9cad88045fa88633513cb56fe6fff99a99793367a1cc091553fa7dd890fb176a3f8cbeb7d80b49ab9eeab708a8172a554575505482b60e2215519d616cd3c6b5d13253f35c802ec5f37a042f100daf8ed7ec4790955763cfcfd54dc8fc80bf4f1953757fae8066", 0x97}], 0x7) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$isdn(0x22, 0x3, 0x1) write$binfmt_misc(r4, &(0x7f00000006c0)={'syz1', "9a867af327495c71a6e240bbff3790c6b4990e1c479cb3d03142cc893b0447f3a79324d33e05ec959e59eafbbd20fc3a"}, 0x34) r5 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl(r5, 0x8, &(0x7f0000000800)="2a076fc818faab5038213ccc8f5c471fe07f3e2d5846bb43044ced655299b47a9a1768e4a44416b5e2198a7f93e9c1d176414d669c1a4bf9e40a24a9eb0e5634c987d95cff0cc28ce12603c0c6828a141112c33e765ec0ccd48685cdca4e301032e9032553560e4014ef7fd6e7076be8c0ac98e1c9f62d525ef6497d83c0142545e82f713d7e779b4be90627c3413192d32a3f512db954c44b9b80c728c724e0d7b66bb56fffb0d1211df2aaa43c2e784a639c0f59f43d88ca23986cc6f7c56e") ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2868.526739][ T3510] BPF: [ 2868.537400][ T3510] BPF:meta_left:0 meta_needed:24 [ 2868.542272][ T3500] BPF: [ 2868.548878][ T3500] BPF:Invalid arg#1 [ 2868.553511][ T3510] BPF: [ 2868.553511][ T3510] [ 2868.559216][ T3509] BPF:btf_header not found [ 2868.564041][ T3500] BPF: [ 2868.564041][ T3500] [ 2868.585474][ T3511] BPF:btf_header not found 09:57:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1e00}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:57:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:57:48 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfffffffffffffde0, 0x14, 0x2, [@enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x3, 0xfffffffd}]}]}}, &(0x7f00000000c0)=""/236, 0x2e, 0xdc, 0x8}, 0x20) [ 2868.774706][ T3522] BPF:[1] FUNC_PROTO (anon) [ 2868.793895][ T3488] Started in network mode [ 2868.800224][ T3488] Own node identity , cluster identity 4711 [ 2868.812501][ T3522] BPF:return=0 args=( [ 2868.821940][ T3493] BPF:[1] DATASEC (anon) [ 2868.837403][ T3522] BPF:0 (invalid-name-offset) [ 2868.844214][ T3522] BPF:, 4 (invalid-name-offset) [ 2868.849301][ T3528] BPF:[1] DATASEC a [ 2868.857723][ T3493] BPF:size=0 vlen=0 [ 2868.858472][ T3528] BPF: [ 2868.864599][ T3522] BPF:) [ 2868.867443][ T3522] BPF: [ 2868.870291][ T3528] BPF:meta_left:0 meta_needed:24 [ 2868.874569][ T3488] Failed to obtain node identity [ 2868.890510][ T3522] BPF:Invalid arg#1 [ 2868.893210][ T3493] BPF: [ 2868.895470][ T3522] BPF: [ 2868.895470][ T3522] [ 2868.898352][ T3530] BPF:[1] ENUM (anon) [ 2868.908819][ T3528] BPF: [ 2868.908819][ T3528] [ 2868.909914][ T3532] BPF:Total section length too long [ 2868.920404][ T3493] BPF:vlen == 0 [ 2868.927550][ T3533] BPF:[1] FUNC_PROTO (anon) [ 2868.932579][ T3488] Enabling of bearer rejected, failed to enable media [ 2868.941027][ T3533] BPF:return=0 args=( [ 2868.942027][ T3530] BPF:size=4 vlen=1 [ 2868.948472][ T3533] BPF:0 (invalid-name-offset) [ 2868.954943][ T3530] BPF: [ 2868.960343][ T3493] BPF: [ 2868.960343][ T3493] [ 2868.964017][ T3534] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2868.970339][ T3530] BPF:Invalid name [ 2868.981288][ T3533] BPF:, 4 (invalid-name-offset) [ 2868.988534][ T3533] BPF:) [ 2868.992568][ T3530] BPF: [ 2868.992568][ T3530] [ 2868.994356][ T3533] BPF: [ 2869.000231][ T3533] BPF:Invalid arg#1 [ 2869.010553][ T3520] BPF:Unsupported section found [ 2869.016165][ T3532] BPF:Total section length too long [ 2869.018961][ T3533] BPF: [ 2869.018961][ T3533] 09:57:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000006c0)='fou\x00') r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") recvmsg(r1, &(0x7f00000024c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000002040)={&(0x7f0000002000)={0x14, r2, 0x903}, 0x14}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000110c0000000c00000000000000000000000000080f0000000000007a450f432f550106ff"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:57:49 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:57:49 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfefe, 0x14, 0x13e, [@restrict={0xa, 0x0, 0x0, 0xb, 0x5}]}}, &(0x7f0000000700)=""/210, 0x2e, 0xdc, 0x8}, 0x20) 09:57:49 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x2000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2869.180028][ T3539] BPF:[1] DATASEC a [ 2869.197864][ T3539] BPF: [ 2869.207580][ T3539] BPF:meta_left:0 meta_needed:24 [ 2869.212981][ T3541] BPF:Total section length too long [ 2869.227111][ T3539] BPF: [ 2869.227111][ T3539] [ 2869.234653][ T3542] BPF:Total section length too long 09:57:49 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:57:49 executing program 1 (fault-call:2 fault-nth:0): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2869.415748][ T3548] BPF:[1] DATASEC a [ 2869.432876][ T3549] BPF:[1] FUNC_PROTO (anon) [ 2869.441311][ T3548] BPF: [ 2869.441562][ T3550] FAULT_INJECTION: forcing a failure. [ 2869.441562][ T3550] name failslab, interval 1, probability 0, space 0, times 0 [ 2869.444253][ T3549] BPF:return=0 args=( [ 2869.466425][ T3548] BPF:meta_left:0 meta_needed:24 [ 2869.477338][ T3548] BPF: [ 2869.477338][ T3548] [ 2869.478065][ T3521] BPF:[1] ENUM (anon) [ 2869.495759][ T3549] BPF:0 (invalid-name-offset) [ 2869.500514][ T3549] BPF:, 4 (invalid-name-offset) [ 2869.511054][ T3521] BPF:size=4 vlen=1 [ 2869.515053][ T3550] CPU: 1 PID: 3550 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2869.522865][ T3550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2869.528851][ T3549] BPF:) [ 2869.532921][ T3550] Call Trace: [ 2869.532948][ T3550] dump_stack+0x172/0x1f0 [ 2869.532971][ T3550] should_fail.cold+0xa/0x15 [ 2869.532991][ T3550] ? fault_create_debugfs_attr+0x180/0x180 [ 2869.533010][ T3550] ? ___might_sleep+0x163/0x2c0 [ 2869.533031][ T3550] __should_failslab+0x121/0x190 [ 2869.540588][ T3549] BPF: [ 2869.543391][ T3550] should_failslab+0x9/0x14 [ 2869.543405][ T3550] kmem_cache_alloc_trace+0x2d3/0x790 [ 2869.543419][ T3550] ? refcount_sub_and_test_checked+0x154/0x200 [ 2869.543436][ T3550] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2869.548021][ T3549] BPF:Invalid arg#1 [ 2869.553841][ T3550] btf_new_fd+0x1c9/0x1d10 [ 2869.553859][ T3550] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2869.553874][ T3550] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2869.553895][ T3550] ? apparmor_capable+0x2ed/0x630 [ 2869.559949][ T3520] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2869.563669][ T3550] ? cap_capable+0x205/0x270 [ 2869.563688][ T3550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2869.563713][ T3550] ? btf_type_seq_show+0x1b0/0x1b0 [ 2869.567094][ T3527] BPF:Unsupported section found [ 2869.570967][ T3550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2869.570981][ T3550] ? ns_capable_common+0x93/0x100 [ 2869.571001][ T3550] __do_sys_bpf+0x1328/0x3350 [ 2869.571021][ T3550] ? bpf_prog_load+0x16c0/0x16c0 [ 2869.577961][ T3549] BPF: 09:57:49 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:57:49 executing program 4: gettid() r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r2, r3, &(0x7f0000000000), 0xffe) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x7000014, 0x51, r2, 0xdc3c9000) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb00000000000c0000000c00000003000000010000000200000c0000e0e47e49c40000000000"], &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2869.577961][ T3549] [ 2869.582519][ T3550] ? __kasan_check_write+0x14/0x20 [ 2869.582537][ T3550] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2869.582553][ T3550] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2869.582572][ T3550] ? wait_for_completion+0x440/0x440 [ 2869.590504][ T3553] BPF:[1] FUNC_PROTO (anon) [ 2869.591735][ T3550] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2869.591749][ T3550] ? fput_many+0x12c/0x1a0 [ 2869.591773][ T3550] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2869.591784][ T3550] ? do_syscall_64+0x26/0x760 [ 2869.591807][ T3550] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2869.596247][ T3553] BPF:return=0 args=( [ 2869.602259][ T3550] ? do_syscall_64+0x26/0x760 [ 2869.602281][ T3550] __x64_sys_bpf+0x73/0xb0 [ 2869.602297][ T3550] do_syscall_64+0xfa/0x760 [ 2869.602320][ T3550] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2869.608638][ T3553] BPF:0 (invalid-name-offset) [ 2869.613549][ T3550] RIP: 0033:0x459f39 [ 2869.613565][ T3550] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2869.613573][ T3550] RSP: 002b:00007f32d3bd0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2869.613586][ T3550] RAX: ffffffffffffffda RBX: 00007f32d3bd0c90 RCX: 0000000000459f39 [ 2869.613594][ T3550] RDX: 0000000000000020 RSI: 0000000020000400 RDI: 0000000000000012 [ 2869.613601][ T3550] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:57:49 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) r1 = socket$netlink(0x10, 0x3, 0x6) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000900)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000b40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x1050800}, 0xc, &(0x7f0000000b00)={&(0x7f0000000940)={0xcc, r2, 0xcc8262708235c857, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x68, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfd67}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ID={0x8}]}, @TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'utp\x00'}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x96e8786fcd4a82f8}, 0x83ac0b8be67b8e06) [ 2869.613608][ T3550] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f32d3bd16d4 [ 2869.613622][ T3550] R13: 00000000004c0368 R14: 00000000004d2738 R15: 0000000000000004 [ 2869.623000][ T3553] BPF:, 4 (invalid-name-offset) [ 2869.632966][ T3521] BPF: [ 2869.651125][ T3553] BPF:) [ 2869.694104][ T3521] BPF:Invalid name [ 2869.717413][ T3556] BPF:Unsupported section found [ 2869.741531][ T3553] BPF: [ 2869.741539][ T3553] BPF:Invalid arg#1 [ 2869.741544][ T3553] BPF: [ 2869.741544][ T3553] [ 2869.782152][ T3521] BPF: [ 2869.782152][ T3521] [ 2869.787277][ T3557] BPF:[1] DATASEC a 09:57:49 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3f00}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2869.862866][ T3559] BPF:btf_header not found [ 2869.883464][ T3560] BPF:btf_header not found [ 2869.901981][ T3562] BPF:Unsupported section found 09:57:49 executing program 1 (fault-call:2 fault-nth:1): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:57:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xffffffffffffff28, 0xc, 0x3, [@typedef={0xf, 0x0, 0x0, 0x8, 0x1}, @const={0x8, 0x0, 0x0, 0xa, 0x5}]}}, &(0x7f0000000700)=""/193, 0x1f, 0xdc, 0x8}, 0x39a) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") splice(r3, &(0x7f00000000c0), r0, &(0x7f0000000100), 0x3, 0x1) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000002c0), 0xfefe) sendfile(r2, r4, &(0x7f0000000000), 0xffe) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) 09:57:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @rand_addr, @initdev}, &(0x7f00000000c0)=0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2869.955959][ T3565] BPF:[1] FUNC_PROTO (anon) [ 2869.961206][ T3557] BPF: [ 2869.964200][ T3557] BPF:meta_left:0 meta_needed:24 [ 2869.969250][ T3557] BPF: [ 2869.969250][ T3557] [ 2869.981152][ T3565] BPF:return=0 args=( [ 2869.996839][ T3565] BPF:0 (invalid-name-offset) [ 2870.031274][ T3565] BPF:, 4 (invalid-name-offset) [ 2870.084538][ T3565] BPF:) [ 2870.102344][ T3565] BPF: [ 2870.122334][ T3571] FAULT_INJECTION: forcing a failure. 09:57:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2870.122334][ T3571] name failslab, interval 1, probability 0, space 0, times 0 [ 2870.151911][ T3565] BPF:Invalid arg#1 [ 2870.157115][ T3575] BPF:Total section length too long [ 2870.191812][ T3565] BPF: [ 2870.191812][ T3565] [ 2870.215405][ T3580] BPF:Total section length too long [ 2870.221072][ T3581] BPF:[1] FUNC_PROTO (anon) [ 2870.228613][ T3571] CPU: 1 PID: 3571 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2870.231316][ T3579] BPF:[1] DATASEC (anon) [ 2870.236438][ T3571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2870.236445][ T3571] Call Trace: [ 2870.236471][ T3571] dump_stack+0x172/0x1f0 [ 2870.236493][ T3571] should_fail.cold+0xa/0x15 [ 2870.236518][ T3571] ? fault_create_debugfs_attr+0x180/0x180 [ 2870.240967][ T3581] BPF:return=0 args=( [ 2870.250903][ T3571] ? ___might_sleep+0x163/0x2c0 [ 2870.250926][ T3571] __should_failslab+0x121/0x190 [ 2870.250944][ T3571] should_failslab+0x9/0x14 [ 2870.250957][ T3571] kmem_cache_alloc_trace+0x2d3/0x790 [ 2870.250970][ T3571] ? refcount_sub_and_test_checked+0x154/0x200 [ 2870.250982][ T3571] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2870.251002][ T3571] btf_new_fd+0x424/0x1d10 [ 2870.256195][ T3579] BPF:size=0 vlen=0 [ 2870.258631][ T3571] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2870.258655][ T3571] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2870.271002][ T3579] BPF: [ 2870.273920][ T3571] ? apparmor_capable+0x2ed/0x630 [ 2870.273933][ T3571] ? cap_capable+0x205/0x270 [ 2870.273957][ T3571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2870.278928][ T3581] BPF:0 (invalid-name-offset) [ 2870.283726][ T3571] ? btf_type_seq_show+0x1b0/0x1b0 [ 2870.283746][ T3571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2870.283758][ T3571] ? ns_capable_common+0x93/0x100 09:57:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") socketpair(0x1, 0xa, 0x7, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000000c0)=0x7, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xc}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2870.283779][ T3571] __do_sys_bpf+0x1328/0x3350 [ 2870.283798][ T3571] ? bpf_prog_load+0x16c0/0x16c0 [ 2870.290997][ T3579] BPF:vlen == 0 [ 2870.293644][ T3571] ? __kasan_check_write+0x14/0x20 [ 2870.293661][ T3571] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2870.293682][ T3571] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2870.301824][ T3584] BPF:[1] ENUM (anon) [ 2870.305381][ T3571] ? wait_for_completion+0x440/0x440 [ 2870.309793][ T3584] BPF:size=4 vlen=1 [ 2870.313609][ T3571] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2870.313623][ T3571] ? fput_many+0x12c/0x1a0 [ 2870.313647][ T3571] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2870.313667][ T3571] ? do_syscall_64+0x26/0x760 [ 2870.319754][ T3581] BPF:, 4 (invalid-name-offset) [ 2870.325861][ T3571] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2870.325877][ T3571] ? do_syscall_64+0x26/0x760 [ 2870.325899][ T3571] __x64_sys_bpf+0x73/0xb0 [ 2870.325915][ T3571] do_syscall_64+0xfa/0x760 [ 2870.325940][ T3571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2870.335068][ T3579] BPF: [ 2870.335068][ T3579] [ 2870.338268][ T3571] RIP: 0033:0x459f39 [ 2870.338283][ T3571] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2870.338291][ T3571] RSP: 002b:00007f32d3bd0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2870.338303][ T3571] RAX: ffffffffffffffda RBX: 00007f32d3bd0c90 RCX: 0000000000459f39 [ 2870.338317][ T3571] RDX: 0000000000000020 RSI: 0000000020000400 RDI: 0000000000000012 [ 2870.344644][ T3581] BPF:) [ 2870.349284][ T3571] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2870.349293][ T3571] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f32d3bd16d4 [ 2870.349301][ T3571] R13: 00000000004c0368 R14: 00000000004d2738 R15: 0000000000000004 [ 2870.375059][ T3584] BPF: [ 2870.383232][ T3585] BPF:[1] DATASEC a [ 2870.392323][ T3584] BPF:Invalid name [ 2870.412158][ T3581] BPF: [ 2870.441151][ T3584] BPF: [ 2870.441151][ T3584] [ 2870.450987][ T3585] BPF: [ 2870.487295][ T3584] BPF:[1] ENUM (anon) 09:57:50 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket(0x5, 0x0, 0x3f) ioctl$IMGETVERSION(r2, 0x80044942, &(0x7f0000000300)) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000480)={r4}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r4, 0x2}, &(0x7f0000000140)=0x8) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r6 = accept$alg(r5, 0x0, 0x0) r7 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r7, &(0x7f00000002c0), 0xfefe) sendfile(r6, r7, &(0x7f0000000000), 0xffe) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r8, 0x401c5820, &(0x7f0000000340)) write$cgroup_int(r8, &(0x7f0000000000), 0xffffff6a) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r9, &(0x7f0000000600)=ANY=[@ANYPTR64], 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_mreq(r9, 0x29, 0x15, &(0x7f0000000200)={@rand_addr="5218721cd3033e4d1958a14070c7fae7", r10}, 0x187) bind$bt_hci(r8, &(0x7f0000000500)={0x1f, r10, 0x1}, 0xc) recvfrom(r6, &(0x7f0000000180)=""/225, 0xe1, 0x10120, &(0x7f0000000280)=@xdp={0x2c, 0xc, r10, 0x3e}, 0x80) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000800)={0x100000001, 0xff, 0x4, 0x40, 0x7, [{0x7ff, 0x101, 0x4, 0x0, 0x0, 0x3800}, {0x7, 0x9, 0x7, 0x0, 0x0, 0x2000}, {0x7, 0x1, 0x0, 0x0, 0x0, 0x54f4958c0f0b095e}, {0x8, 0x0, 0x20}, {0xdc71, 0x5, 0x0, 0x0, 0x0, 0x2b02}, {0x4, 0xfffffffffffffff7, 0x1ff, 0x0, 0x0, 0x2000}, {0x3ff, 0x6c38, 0x4, 0x0, 0x0, 0x1003}]}) r11 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r11, 0x0, 0x2a, &(0x7f0000000640)={0x5, {{0x2, 0x4e24, @loopback}}}, 0x88) 09:57:50 executing program 1 (fault-call:2 fault-nth:2): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2870.528694][ T3581] BPF:Invalid arg#1 [ 2870.555451][ T3590] BPF:[1] FUNC a [ 2870.562281][ T3590] BPF:type_id=0 [ 2870.577537][ T3581] BPF: [ 2870.577537][ T3581] 09:57:50 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2870.615908][ T3593] BPF:[1] DATASEC (anon) [ 2870.630641][ T3593] BPF:size=0 vlen=0 [ 2870.636928][ T3593] BPF: [ 2870.641418][ T3590] BPF: [ 2870.646569][ T3593] BPF:vlen == 0 [ 2870.651171][ T3590] BPF:vlen != 0 [ 2870.657747][ T3593] BPF: [ 2870.657747][ T3593] [ 2870.667401][ T3590] BPF: [ 2870.667401][ T3590] [ 2870.685448][ T3597] BPF:[1] FUNC a [ 2870.691505][ T3585] BPF:meta_left:0 meta_needed:24 [ 2870.702363][ T3597] BPF:type_id=0 [ 2870.714075][ T3597] BPF: [ 2870.723308][ T3601] BPF:[1] FUNC_PROTO (anon) [ 2870.723876][ T3597] BPF:vlen != 0 [ 2870.728047][ T3601] BPF:return=0 args=( [ 2870.740656][ T3585] BPF: [ 2870.740656][ T3585] [ 2870.744813][ T3584] BPF:size=4 vlen=1 [ 2870.749750][ T3601] BPF:0 (invalid-name-offset) [ 2870.758687][ T3597] BPF: [ 2870.758687][ T3597] [ 2870.769148][ T3584] BPF: 09:57:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x3, [@union={0x1, 0xa, 0x0, 0xc, 0x0, 0x0, [{0x4, 0x3, 0x3}, {0xe, 0x1, 0x40}, {0x9, 0x0, 0x119}, {0xb, 0x0, 0x9b}, {0xa, 0x3, 0x200}, {0x9, 0x3, 0x2}, {0x4, 0x5, 0x7}, {0x0, 0x1}, {0x40c, 0x4, 0x2}, {0x5, 0x1, 0x5}]}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x9f, 0xdc, 0x8}, 0x20) [ 2870.774202][ T3601] BPF:, 4 (invalid-name-offset) [ 2870.779289][ T3584] BPF:Invalid name [ 2870.789839][ T3584] BPF: [ 2870.789839][ T3584] [ 2870.795853][ T3601] BPF:) [ 2870.798740][ T3601] BPF: [ 2870.811074][ T3601] BPF:Invalid arg#1 09:57:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2870.827189][ T3601] BPF: [ 2870.827189][ T3601] 09:57:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb0100180000140000000200000000000000014700060400000000000000000000000000000000000000000000e5e4cb11b7cf8438f1ea3c28d34907547cf690880c132752c1fba30ae65efc3b5d704461c300c8f0eab134156603abc8be4f5febb1e31aa5f155e9a93f159a7abccf988faf618118314bf294ac3c7386e08b3d1573dc295fff8399ce246be812bb55d5418e602c06d03075195910e220ad3792f0eec5"], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2870.883183][ T3606] BPF:[1] FUNC a [ 2870.889188][ T3607] BPF:[1] FUNC_PROTO (anon) [ 2870.906454][ T3607] BPF:return=0 args=( [ 2870.911624][ T3606] BPF:type_id=0 [ 2870.918282][ T3610] FAULT_INJECTION: forcing a failure. [ 2870.918282][ T3610] name failslab, interval 1, probability 0, space 0, times 0 [ 2870.953541][ T3606] BPF: [ 2870.956473][ T3606] BPF:vlen != 0 [ 2870.971085][ T3607] BPF:0 (invalid-name-offset) [ 2870.975956][ T3606] BPF: [ 2870.975956][ T3606] [ 2870.985505][ T3607] BPF:, 4 (invalid-name-offset) [ 2870.993221][ T3612] BPF:[1] FUNC a [ 2871.001184][ T3607] BPF:) [ 2871.004104][ T3612] BPF:type_id=0 [ 2871.007652][ T3612] BPF: [ 2871.010563][ T3610] CPU: 0 PID: 3610 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2871.018393][ T3610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2871.024274][ T3615] BPF:[1] DATASEC a [ 2871.028575][ T3610] Call Trace: [ 2871.028601][ T3610] dump_stack+0x172/0x1f0 [ 2871.028634][ T3610] should_fail.cold+0xa/0x15 [ 2871.044769][ T3610] ? fault_create_debugfs_attr+0x180/0x180 [ 2871.050612][ T3610] ? ___might_sleep+0x163/0x2c0 [ 2871.055481][ T3610] __should_failslab+0x121/0x190 [ 2871.056743][ T3616] BPF:btf_header not found [ 2871.060427][ T3610] should_failslab+0x9/0x14 [ 2871.060440][ T3610] kmem_cache_alloc_node_trace+0x274/0x750 [ 2871.060465][ T3610] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2871.064997][ T3615] BPF: [ 2871.069356][ T3610] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2871.069376][ T3610] __kmalloc_node+0x3d/0x70 [ 2871.069394][ T3610] kvmalloc_node+0x68/0x100 [ 2871.069419][ T3610] btf_new_fd+0x468/0x1d10 [ 2871.081447][ T3607] BPF: [ 2871.083933][ T3610] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2871.089717][ T3607] BPF:Invalid arg#1 [ 2871.094203][ T3610] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2871.094219][ T3610] ? apparmor_capable+0x2ed/0x630 [ 2871.094229][ T3610] ? cap_capable+0x205/0x270 [ 2871.094243][ T3610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2871.094259][ T3610] ? btf_type_seq_show+0x1b0/0x1b0 [ 2871.094274][ T3610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2871.094286][ T3610] ? ns_capable_common+0x93/0x100 09:57:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x1, @remote, 0x4}, 0x1c) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x6628, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000000), &(0x7f00000000c0)=0x4) [ 2871.094305][ T3610] __do_sys_bpf+0x1328/0x3350 [ 2871.094324][ T3610] ? bpf_prog_load+0x16c0/0x16c0 [ 2871.094354][ T3610] ? __kasan_check_write+0x14/0x20 [ 2871.094369][ T3610] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2871.094390][ T3610] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2871.109095][ T3617] BPF:btf_header not found [ 2871.112090][ T3610] ? wait_for_completion+0x440/0x440 [ 2871.112114][ T3610] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2871.112127][ T3610] ? fput_many+0x12c/0x1a0 09:57:51 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2871.112153][ T3610] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2871.112166][ T3610] ? do_syscall_64+0x26/0x760 [ 2871.112178][ T3610] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2871.112198][ T3610] ? do_syscall_64+0x26/0x760 [ 2871.131161][ T3615] BPF:meta_left:0 meta_needed:24 [ 2871.131843][ T3610] __x64_sys_bpf+0x73/0xb0 [ 2871.151054][ T3615] BPF: [ 2871.151054][ T3615] [ 2871.154422][ T3610] do_syscall_64+0xfa/0x760 [ 2871.154445][ T3610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2871.154461][ T3610] RIP: 0033:0x459f39 [ 2871.179929][ T3607] BPF: [ 2871.179929][ T3607] [ 2871.254386][ T3610] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2871.274001][ T3610] RSP: 002b:00007f32d3bafc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2871.274015][ T3610] RAX: ffffffffffffffda RBX: 00007f32d3bafc90 RCX: 0000000000459f39 [ 2871.274023][ T3610] RDX: 0000000000000020 RSI: 0000000020000400 RDI: 0000000000000012 09:57:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4800}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2871.274030][ T3610] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2871.274038][ T3610] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f32d3bb06d4 [ 2871.274046][ T3610] R13: 00000000004c0368 R14: 00000000004d2738 R15: 0000000000000003 [ 2871.282738][ T3612] BPF:vlen != 0 [ 2871.377642][ T3622] BPF:[1] DATASEC a [ 2871.393300][ T3612] BPF: [ 2871.393300][ T3612] [ 2871.398245][ T3622] BPF: [ 2871.411980][ T3624] BPF:[1] ENUM (anon) [ 2871.416124][ T3624] BPF:size=4 vlen=1 [ 2871.419939][ T3624] BPF: [ 2871.422880][ T3622] BPF:meta_left:0 meta_needed:24 09:57:51 executing program 1 (fault-call:2 fault-nth:3): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2871.444986][ T3626] BPF:[1] FUNC_PROTO (anon) [ 2871.452561][ T3596] BPF:[1] DATASEC (anon) [ 2871.456669][ T3622] BPF: [ 2871.456669][ T3622] [ 2871.467436][ T3626] BPF:return=0 args=( [ 2871.469375][ T3596] BPF:size=0 vlen=0 [ 2871.472203][ T3624] BPF:Invalid name [ 2871.479079][ T3624] BPF: [ 2871.479079][ T3624] [ 2871.490711][ T3626] BPF:0 (invalid-name-offset) 09:57:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000003000000010000000200000c00000000007100"], &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:57:51 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 2871.519168][ T3626] BPF:, 4 (invalid-name-offset) [ 2871.537043][ T3596] BPF: [ 2871.538234][ T3626] BPF:) [ 2871.547589][ T3626] BPF: [ 2871.550521][ T3626] BPF:Invalid arg#1 [ 2871.563760][ T3626] BPF: [ 2871.563760][ T3626] [ 2871.576330][ T3636] BPF:[1] FUNC q [ 2871.591613][ T3638] BPF:[1] FUNC_PROTO (anon) [ 2871.604970][ T3638] BPF:return=0 args=( [ 2871.608179][ T3596] BPF:vlen == 0 [ 2871.617439][ T3636] BPF:type_id=0 [ 2871.618454][ T3638] BPF:0 (invalid-name-offset) [ 2871.634486][ T3638] BPF:, 4 (invalid-name-offset) [ 2871.639492][ T3636] BPF: [ 2871.642897][ T3638] BPF:) [ 2871.648055][ T3638] BPF: [ 2871.651146][ T3596] BPF: [ 2871.651146][ T3596] [ 2871.654143][ T3636] BPF:vlen != 0 [ 2871.658320][ T3638] BPF:Invalid arg#1 [ 2871.668441][ T3638] BPF: [ 2871.668441][ T3638] [ 2871.668831][ T3636] BPF: [ 2871.668831][ T3636] [ 2871.704530][ T3643] BPF:[1] FUNC q [ 2871.721914][ T3643] BPF:type_id=0 [ 2871.745785][ T3643] BPF: [ 2871.762687][ T3643] BPF:vlen != 0 [ 2871.771333][ T3643] BPF: [ 2871.771333][ T3643] 09:57:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4c00}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:57:51 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:57:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@local, @in=@initdev}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:57:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000080)={{0x2, 0x0, @descriptor="723e7939aae3e912"}}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xc}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2871.951141][ T3653] BPF:[1] FUNC_PROTO (anon) [ 2871.967838][ T3653] BPF:return=0 args=( [ 2871.974352][ T3653] BPF:0 (invalid-name-offset) [ 2871.983356][ T3653] BPF:, 4 (invalid-name-offset) [ 2871.989625][ T3654] BPF:[1] FUNC a [ 2871.993019][ T3653] BPF:) [ 2871.998437][ T3653] BPF: 09:57:51 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 2872.001428][ T3654] BPF:type_id=0 [ 2872.010985][ T3654] BPF: [ 2872.021030][ T3653] BPF:Invalid arg#1 [ 2872.024987][ T3653] BPF: [ 2872.024987][ T3653] [ 2872.036654][ T3654] BPF:vlen != 0 [ 2872.040745][ T3654] BPF: [ 2872.040745][ T3654] [ 2872.048734][ T3659] BPF:[1] FUNC_PROTO (anon) [ 2872.056208][ T3654] BPF:[1] FUNC a [ 2872.060207][ T3654] BPF:type_id=0 [ 2872.072956][ T3654] BPF: [ 2872.085546][ T3654] BPF:vlen != 0 [ 2872.091347][ T3663] BPF:[1] DATASEC (anon) [ 2872.093757][ T3654] BPF: [ 2872.093757][ T3654] [ 2872.096518][ T3628] BPF:[1] ENUM (anon) [ 2872.108320][ T3659] BPF:return=0 args=( [ 2872.114468][ T3663] BPF:size=0 vlen=0 [ 2872.128724][ T3663] BPF: [ 2872.136357][ T3628] BPF:size=4 vlen=1 09:57:52 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x6628, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000080)=0x3ff, 0x4) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xc}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2872.149111][ T3663] BPF:vlen == 0 [ 2872.155645][ T3659] BPF:0 (invalid-name-offset) [ 2872.161378][ T3628] BPF: [ 2872.164408][ T3663] BPF: [ 2872.164408][ T3663] [ 2872.170170][ T3628] BPF:Invalid name [ 2872.185930][ T3628] BPF: [ 2872.185930][ T3628] [ 2872.187116][ T3659] BPF:, 4 (invalid-name-offset) [ 2872.193540][ T3668] BPF:[1] DATASEC (anon) [ 2872.196066][ T3659] BPF:) [ 2872.209149][ T3668] BPF:size=0 vlen=0 [ 2872.217813][ T3668] BPF: [ 2872.226545][ T3668] BPF:vlen == 0 [ 2872.234376][ T3659] BPF: [ 2872.240077][ T3668] BPF: [ 2872.240077][ T3668] [ 2872.241005][ T3659] BPF:Invalid arg#1 [ 2872.262426][ T3645] FAULT_INJECTION: forcing a failure. [ 2872.262426][ T3645] name failslab, interval 1, probability 0, space 0, times 0 [ 2872.264451][ T3659] BPF: [ 2872.264451][ T3659] 09:57:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x6628, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, &(0x7f00000000c0)={{0x30, 0x40, 0x9, 0x1, 0x0, 0x9}, 0x6, 0x2, 0x1}) setsockopt$inet_mreq(r1, 0x0, 0x0, &(0x7f0000000000)={@broadcast, @multicast2}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) 09:57:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000700)=""/220, 0x0, 0xdc, 0x8}, 0x20) 09:57:52 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x6000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2872.338903][ T3675] BPF:[1] FUNC a [ 2872.350472][ T3675] BPF:type_id=0 [ 2872.361433][ T3645] CPU: 0 PID: 3645 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2872.369290][ T3645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2872.379362][ T3645] Call Trace: [ 2872.382689][ T3645] dump_stack+0x172/0x1f0 [ 2872.387047][ T3645] should_fail.cold+0xa/0x15 [ 2872.391666][ T3645] ? fault_create_debugfs_attr+0x180/0x180 [ 2872.397501][ T3645] ? ___might_sleep+0x163/0x2c0 [ 2872.402375][ T3645] __should_failslab+0x121/0x190 [ 2872.407334][ T3645] should_failslab+0x9/0x14 [ 2872.411852][ T3645] kmem_cache_alloc_node_trace+0x274/0x750 [ 2872.417690][ T3645] ? sort_r+0x2e3/0x340 [ 2872.421863][ T3645] ? btf_var_seq_show+0x50/0x50 [ 2872.421881][ T3645] __kmalloc_node+0x3d/0x70 [ 2872.421899][ T3645] kvmalloc_node+0x68/0x100 [ 2872.421915][ T3645] btf_check_all_metas+0x510/0x860 [ 2872.421936][ T3645] btf_new_fd+0x8bf/0x1d10 [ 2872.421954][ T3645] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2872.421976][ T3645] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2872.431303][ T3645] ? apparmor_capable+0x2ed/0x630 [ 2872.431317][ T3645] ? cap_capable+0x205/0x270 [ 2872.431332][ T3645] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2872.431349][ T3645] ? btf_type_seq_show+0x1b0/0x1b0 [ 2872.431366][ T3645] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2872.431380][ T3645] ? ns_capable_common+0x93/0x100 [ 2872.431399][ T3645] __do_sys_bpf+0x1328/0x3350 [ 2872.431416][ T3645] ? bpf_prog_load+0x16c0/0x16c0 [ 2872.431429][ T3645] ? __kasan_check_write+0x14/0x20 [ 2872.431452][ T3645] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2872.431468][ T3645] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2872.431486][ T3645] ? wait_for_completion+0x440/0x440 [ 2872.439380][ T3675] BPF: [ 2872.441075][ T3645] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2872.441089][ T3645] ? fput_many+0x12c/0x1a0 09:57:52 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:57:52 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) setsockopt$ax25_int(r1, 0x101, 0x9, &(0x7f0000000080)=0x9, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2872.441114][ T3645] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2872.441126][ T3645] ? do_syscall_64+0x26/0x760 [ 2872.441149][ T3645] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2872.447050][ T3677] BPF:hdr_len not found [ 2872.451530][ T3645] ? do_syscall_64+0x26/0x760 [ 2872.451553][ T3645] __x64_sys_bpf+0x73/0xb0 [ 2872.451567][ T3645] do_syscall_64+0xfa/0x760 [ 2872.451588][ T3645] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2872.451599][ T3645] RIP: 0033:0x459f39 [ 2872.451613][ T3645] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2872.451627][ T3645] RSP: 002b:00007f32d3b8ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2872.479259][ T3675] BPF:vlen != 0 [ 2872.485101][ T3645] RAX: ffffffffffffffda RBX: 00007f32d3b8ec90 RCX: 0000000000459f39 [ 2872.485109][ T3645] RDX: 0000000000000020 RSI: 0000000020000400 RDI: 0000000000000012 [ 2872.485117][ T3645] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 09:57:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000700)=""/220, 0x0, 0xdc, 0x8}, 0x20) [ 2872.485125][ T3645] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f32d3b8f6d4 [ 2872.485132][ T3645] R13: 00000000004c0368 R14: 00000000004d2738 R15: 0000000000000004 [ 2872.627163][ T3681] BPF:[1] FUNC_PROTO (anon) [ 2872.725737][ T3687] BPF:[1] DATASEC (anon) [ 2872.757352][ T3681] BPF:return=0 args=( [ 2872.772070][ T3687] BPF:size=0 vlen=0 [ 2872.781825][ T3687] BPF: [ 2872.786771][ T3681] BPF:0 (invalid-name-offset) 09:57:52 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2872.803171][ T3681] BPF:, 4 (invalid-name-offset) [ 2872.807616][ T3690] BPF:hdr_len not found [ 2872.815852][ T3687] BPF:vlen == 0 [ 2872.821460][ T3681] BPF:) [ 2872.841357][ T3681] BPF: [ 2872.850052][ T3681] BPF:Invalid arg#1 [ 2872.861249][ T3681] BPF: [ 2872.861249][ T3681] [ 2872.869016][ T3687] BPF: [ 2872.869016][ T3687] [ 2872.886140][ T3681] BPF:[1] FUNC_PROTO (anon) [ 2872.901384][ T3681] BPF:return=0 args=( 09:57:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000700)=""/220, 0x0, 0xdc, 0x8}, 0x20) [ 2872.919196][ T3681] BPF:0 (invalid-name-offset) [ 2872.934116][ T3696] BPF:[1] ENUM (anon) [ 2872.943560][ T3681] BPF:, 4 (invalid-name-offset) [ 2872.944473][ T3696] BPF:size=4 vlen=1 [ 2872.964692][ T3681] BPF:) 09:57:52 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2872.979713][ T3681] BPF: [ 2872.999539][ T3681] BPF:Invalid arg#1 [ 2873.017097][ T3681] BPF: [ 2873.017097][ T3681] [ 2873.023856][ T3696] BPF: 09:57:53 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x6800}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2873.049955][ T3696] BPF:Invalid name [ 2873.059561][ T3701] BPF:hdr_len not found [ 2873.086774][ T3696] BPF: [ 2873.086774][ T3696] 09:57:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x1b, 0xdc, 0x8}, 0x20) [ 2873.217211][ T3675] BPF: [ 2873.217211][ T3675] [ 2873.248821][ T3719] BPF:[1] FUNC_PROTO (anon) [ 2873.272866][ T3719] BPF:return=0 args=( [ 2873.286576][ T3719] BPF:0 (invalid-name-offset) [ 2873.310960][ T3719] BPF:, 4 (invalid-name-offset) [ 2873.317374][ T3723] BPF:No type found [ 2873.323708][ T3719] BPF:) [ 2873.330002][ T3719] BPF: [ 2873.341193][ T3719] BPF:Invalid arg#1 [ 2873.345214][ T3719] BPF: [ 2873.345214][ T3719] [ 2873.357064][ T3726] BPF:[1] FUNC_PROTO (anon) [ 2873.365374][ T3726] BPF:return=0 args=( 09:57:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xc}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) r1 = socket(0x5, 0x8000d, 0x1) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @broadcast}, 0x10) [ 2873.369976][ T3726] BPF:0 (invalid-name-offset) [ 2873.374969][ T3726] BPF:, 4 (invalid-name-offset) [ 2873.380032][ T3726] BPF:) [ 2873.383060][ T3726] BPF: [ 2873.385984][ T3726] BPF:Invalid arg#1 [ 2873.389981][ T3726] BPF: [ 2873.389981][ T3726] [ 2873.470126][ T3687] BPF:[1] DATASEC (anon) [ 2873.508050][ T3687] BPF:size=0 vlen=0 [ 2873.521334][ T3687] BPF: [ 2873.524283][ T3687] BPF:vlen == 0 [ 2873.527820][ T3687] BPF: [ 2873.527820][ T3687] [ 2873.598583][ T3731] BPF:[1] FUNC a [ 2873.602700][ T3731] BPF:type_id=0 [ 2873.606289][ T3731] BPF: [ 2873.609152][ T3731] BPF:vlen != 0 [ 2873.621243][ T3731] BPF: [ 2873.621243][ T3731] [ 2873.639656][ T3696] BPF:[1] ENUM (anon) 09:57:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x2000000000000350, 0x0, 0x6, 0x4, [{0x7, 0x7}, {0x8, 0x2}, {0x2, 0x1a}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) 09:57:53 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:57:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x1b, 0xdc, 0x8}, 0x20) 09:57:53 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x6c00}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:57:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb0100180000000023000018000000181a035c7f4e4b5f4ffcf8df5861ab9c5800000002000000050000000100000401000064ee1fa528b1e9e16f6444d4000900"], &(0x7f0000000700)=""/220, 0x240, 0xdc, 0x8}, 0x20) r1 = socket$inet6(0xa, 0x6c4f2ac60da654e3, 0x80) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000000)=@fragment={0x89, 0x0, 0x5, 0x0, 0x0, 0x7, 0x66}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x6628, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x14, &(0x7f0000000080)="76f28b416041a5e377a0cfc696e05fdabccfb28a2c815b3765b65000e5b5187a06db92b9bfdc114610fceca990977b76efbb19b86cff154b8591cc16475ad6c0b2d47daf47a2ff701663", 0x4a) [ 2873.645811][ T3696] BPF:size=4 vlen=1 [ 2873.651204][ T3732] BPF:[1] FUNC a [ 2873.653075][ T3696] BPF: [ 2873.654865][ T3732] BPF:type_id=0 [ 2873.654872][ T3732] BPF: [ 2873.654878][ T3732] BPF:vlen != 0 [ 2873.654885][ T3732] BPF: [ 2873.654885][ T3732] [ 2873.673492][ T3696] BPF:Invalid name [ 2873.677372][ T3696] BPF: [ 2873.677372][ T3696] 09:57:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000480)=ANY=[@ANYRES32=r4, @ANYBLOB="000000d1"], &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000000)={r4, 0xe, "f74793c123c0cd703f2f1d8bca5a"}, &(0x7f0000000080)=0x16) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={r5, 0x7f, 0x100, 0x9, 0x0, 0x400}, 0x14) r6 = socket$alg(0x26, 0x5, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r8 = accept$inet(r7, &(0x7f0000000140)={0x2, 0x0, @multicast2}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000001c0)={r4, 0x5}, &(0x7f0000000200)=0x8) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r10, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r10, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r10, 0x6628, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r10, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r8, 0x84, 0x6d, &(0x7f0000000240)={r9, 0xb, "dcc061abcc758e3268f6dc"}, &(0x7f0000000280)=0x13) bind$alg(r6, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$sock_inet_SIOCGIFDSTADDR(r6, 0x8917, &(0x7f0000000100)={'gre0\x00', {0x2, 0x4e22, @local}}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") [ 2873.736865][ T3736] BPF:[1] FUNC_PROTO (anon) [ 2873.749512][ T3738] BPF:No type found [ 2873.768869][ T3736] BPF:return=0 args=( 09:57:53 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2873.817104][ T3743] BPF:Invalid section offset [ 2873.821009][ T3736] BPF:0 (invalid-name-offset) [ 2873.837538][ T3736] BPF:, 4 (invalid-name-offset) 09:57:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x1b, 0xdc, 0x8}, 0x20) [ 2873.876275][ T3736] BPF:) [ 2873.879126][ T3736] BPF: [ 2873.932185][ T3736] BPF:Invalid arg#1 [ 2873.936044][ T3736] BPF: [ 2873.936044][ T3736] 09:57:53 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2874.007985][ T3754] BPF:[1] FUNC_PROTO (anon) [ 2874.010159][ T3753] BPF:No type found 09:57:54 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2874.075747][ T3754] BPF:return=0 args=( [ 2874.077604][ T3758] BPF:Invalid string section [ 2874.111037][ T3754] BPF:0 (invalid-name-offset) [ 2874.119520][ T3761] BPF:Invalid string section 09:57:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2874.163688][ T3754] BPF:, 4 (invalid-name-offset) [ 2874.181004][ T3754] BPF:) [ 2874.183851][ T3754] BPF: [ 2874.186623][ T3754] BPF:Invalid arg#1 [ 2874.190436][ T3754] BPF: [ 2874.190436][ T3754] 09:57:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = accept(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000000)=0x80) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000480)={r4}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140)={r4, 0x9, 0xe60, 0x2, 0x3, 0x2008}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r5, 0xa68, 0x6}, &(0x7f0000000200)=0xc) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x30, 0x0, 0x0, 0x30]}}, &(0x7f0000000700)=""/220, 0x1e, 0xdc, 0x8}, 0x20) [ 2874.258553][ T3766] BPF:[1] DATASEC (anon) 09:57:54 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7400}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2874.287486][ T3766] BPF: [ 2874.313387][ T3766] BPF:meta_left:0 meta_needed:24 [ 2874.355393][ T3766] BPF: [ 2874.355393][ T3766] [ 2874.405583][ T3772] BPF:[1] FUNC_PROTO (anon) 09:57:54 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:57:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2874.435604][ T3772] BPF:return=0 args=( [ 2874.454607][ T3772] BPF:0 (invalid-name-offset) [ 2874.473416][ T3772] BPF:, 4 (invalid-name-offset) [ 2874.479290][ T3776] BPF:No type found [ 2874.488536][ T3772] BPF:) [ 2874.514709][ T3772] BPF: [ 2874.528543][ T3772] BPF:Invalid arg#1 [ 2874.561306][ T3772] BPF: [ 2874.561306][ T3772] 09:57:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000140)=0x8001, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2874.583720][ T3780] BPF:[1] DATASEC (anon) [ 2874.588254][ T3780] BPF:size=0 vlen=0 [ 2874.595862][ T3783] BPF:[1] FUNC_PROTO (anon) [ 2874.606287][ T3783] BPF:return=0 args=( [ 2874.618314][ T3780] BPF: [ 2874.625790][ T3783] BPF:0 (invalid-name-offset) [ 2874.641473][ T3780] BPF:vlen == 0 [ 2874.648585][ T3752] BPF:Invalid section offset [ 2874.649989][ T3780] BPF: [ 2874.649989][ T3780] [ 2874.660533][ T3783] BPF:, 4 (invalid-name-offset) [ 2874.681056][ T3783] BPF:) [ 2874.683952][ T3783] BPF: [ 2874.707228][ T3783] BPF:Invalid arg#1 09:57:54 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c00eaff0bfaffffffff0b09b40c6b096c6ad6ffff9347200573"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2874.731262][ T3783] BPF: [ 2874.731262][ T3783] [ 2874.731295][ T3789] BPF:Invalid magic 09:57:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:57:54 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:57:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r2, r3, &(0x7f0000000000), 0xffe) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000100)=0x2) openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x6628, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000480)={r6}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000080)={r6, 0x9ef}, 0x8) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xc}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:57:54 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7a00}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2874.771471][ T3791] BPF:Invalid magic 09:57:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x4}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r2, r3, &(0x7f0000000000), 0xffe) ioctl$int_out(r2, 0x7e52, &(0x7f0000000080)) [ 2874.928845][ T3799] BPF:[1] DATASEC (anon) [ 2874.940189][ T3799] BPF:size=0 vlen=0 [ 2874.950507][ T3802] BPF:[1] FUNC_PROTO (anon) [ 2874.981766][ T3799] BPF: [ 2874.986556][ T3802] BPF:return=0 args=( [ 2874.997190][ T3799] BPF:vlen == 0 [ 2875.012348][ T3799] BPF: [ 2875.012348][ T3799] [ 2875.018507][ T3805] BPF:Invalid section offset [ 2875.019333][ T3802] BPF:0 (invalid-name-offset) 09:57:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2875.030222][ T3807] BPF:Invalid section offset [ 2875.035196][ T3802] BPF:, 4 (invalid-name-offset) [ 2875.052269][ T3802] BPF:) [ 2875.071998][ T3802] BPF: [ 2875.092334][ T3809] BPF:[1] Invalid name_offset:4 [ 2875.103708][ T3802] BPF:Invalid arg#1 [ 2875.131358][ T3802] BPF: [ 2875.131358][ T3802] 09:57:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:57:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="edbc0000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000480)={r2}, &(0x7f0000000580)=0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r6, 0x84, 0x1b, &(0x7f0000000480)={r8}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000180)={r8, @in6={{0xa, 0x4e22, 0x9, @ipv4={[], [], @multicast1}, 0x3}}, 0x1, 0x8001, 0x9, 0x0, 0x20}, 0x98) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000480)={r5}, &(0x7f0000000580)=0x8) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r9, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r9, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r9, 0x6628, 0x0) socketpair(0x1, 0xab63f8e465eebb24, 0x20, &(0x7f0000000100)) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r10, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r10, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r10, 0x6628, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r10, 0x84, 0x7b, &(0x7f0000000140)={r5, 0x117b}, 0x2cb) r11 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r11, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="0b71c32618000000000000000c0000000c00000002000000f0ffffffffffff0e000000000000"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2875.153682][ T3813] BPF:[1] FUNC_PROTO (anon) [ 2875.162288][ T3814] BPF:[1] Invalid name_offset:4 [ 2875.195847][ T3813] BPF:return=0 args=( [ 2875.229756][ T3813] BPF:0 (invalid-name-offset) 09:57:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:57:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@xdp, &(0x7f0000000000)=0x80) r2 = socket$inet(0x10, 0x3, 0x20000000006) sendmsg(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000000)="24000000150007031dfffd946fa2830002200a0009000000741d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000100)=@ethernet, 0x80, &(0x7f0000000180)=[{&(0x7f0000000300)=""/69, 0x45}, {&(0x7f0000000440)=""/155, 0x9b}, {&(0x7f0000000500)=""/245, 0xf5}, {&(0x7f0000000600)=""/217, 0xd9}], 0x4}, 0x40002260) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2875.255970][ T3813] BPF:, 4 (invalid-name-offset) [ 2875.273676][ T3813] BPF:) [ 2875.276894][ T3823] BPF:[1] DATASEC (anon) [ 2875.281874][ T3813] BPF: [ 2875.290728][ T3813] BPF:Invalid arg#1 [ 2875.309389][ T3813] BPF: [ 2875.309389][ T3813] [ 2875.323367][ T3823] BPF:size=0 vlen=0 [ 2875.323921][ T3824] BPF:[1] FUNC a [ 2875.327214][ T3823] BPF: [ 2875.327221][ T3823] BPF:vlen == 0 [ 2875.327227][ T3823] BPF: [ 2875.327227][ T3823] [ 2875.347285][ T3827] BPF:Invalid magic 09:57:55 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xda00}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:57:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:57:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2875.435633][ T3832] BPF:[1] ENUM (anon) [ 2875.439753][ T3832] BPF:size=4 vlen=1 [ 2875.502367][ T3824] BPF:type_id=0 [ 2875.522092][ T3837] BPF:[1] DATASEC (anon) [ 2875.523714][ T3832] BPF: [ 2875.537805][ T3837] BPF: [ 2875.541153][ T3832] BPF:Invalid name [ 2875.545175][ T3832] BPF: [ 2875.545175][ T3832] [ 2875.552764][ T3840] BPF:[1] FUNC_PROTO (anon) [ 2875.561265][ T3824] BPF: [ 2875.572257][ T3837] BPF:meta_left:0 meta_needed:24 [ 2875.580633][ T3824] BPF:vlen != 0 [ 2875.581282][ T3840] BPF:return=0 args=( [ 2875.589218][ T3837] BPF: [ 2875.589218][ T3837] [ 2875.595891][ T3840] BPF:0 (invalid-name-offset) 09:57:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2875.602673][ T3824] BPF: [ 2875.602673][ T3824] [ 2875.608810][ T3843] BPF:[1] ENUM (anon) [ 2875.611497][ T3840] BPF:, 4 (invalid-name-offset) [ 2875.621072][ T3843] BPF:size=4 vlen=1 [ 2875.648146][ T3843] BPF: [ 2875.653929][ T3840] BPF:) [ 2875.661687][ T3843] BPF:Invalid name [ 2875.669429][ T3840] BPF: [ 2875.683781][ T3843] BPF: [ 2875.683781][ T3843] [ 2875.686988][ T3840] BPF:Invalid arg#1 [ 2875.734829][ T3840] BPF: [ 2875.734829][ T3840] [ 2875.781260][ T3849] BPF:[1] FUNC_PROTO (anon) [ 2875.785898][ T3849] BPF:return=0 args=( [ 2875.789883][ T3849] BPF:0 (invalid-name-offset) [ 2875.875771][ T3849] BPF:, 4 (invalid-name-offset) [ 2875.880756][ T3849] BPF:) [ 2875.891059][ T3849] BPF: [ 2875.893930][ T3849] BPF:Invalid arg#1 [ 2875.903610][ T3849] BPF: [ 2875.903610][ T3849] 09:57:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) sendfile(r1, r2, &(0x7f0000000000), 0xffd) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000080)="9a2798c1354d584b384ca02bcd392e083c462dd5a0e7b1b7945f2cf6487d26fb408dd3aafcbcea918130415215a02ccc365e960aaa852b88eebe27b2fed5d90b0404f1c595fa9652b3f95cbdf63e1f40c25811c13a24b833da736049e741c4fcca8847ca2f4222469381127cfc59628a610b34b8e11e3c947089fcb402c0db627a33c5974e4af48aaa9ba007a8cc379222af3d8b15c91950b34cde70a377a809ad33d8bafe86e3b555b3bccfd121eec596998dbcc03580930fd8e2f181e48acfc59c55674736db3e2c280739152eeceff05254534517169c355fb2ba584db9dfa5f4616e7f649b2a7d8a83c3aa258b3a29cb4bfb35acc412b2e719e9215edab9") r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xc}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:57:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x0, 0x0, 0xf}]}, {0x0, [0x0]}}, 0x0, 0x27, 0x0, 0x8}, 0x20) 09:57:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:57:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x40000}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) 09:57:56 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xfffff}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2876.024175][ T3824] BPF:[1] FUNC a [ 2876.028606][ T3824] BPF:type_id=0 [ 2876.032999][ T3824] BPF: [ 2876.035892][ T3824] BPF:vlen != 0 [ 2876.044858][ T3824] BPF: [ 2876.044858][ T3824] [ 2876.052053][ T3827] BPF:Invalid magic 09:57:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000ef83fe1e00000c000000b0fe0000000000000000000f000000000000"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2876.118344][ T3857] BPF: Invalid name_offset:262144 [ 2876.137221][ T3859] BPF:[1] FUNC_PROTO (anon) [ 2876.145031][ T3861] BPF: Invalid name_offset:262144 09:57:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x0, 0x0, 0xf}]}, {0x0, [0x0]}}, 0x0, 0x27, 0x0, 0x8}, 0x20) 09:57:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2876.171963][ T3859] BPF:return=0 args=( [ 2876.176065][ T3859] BPF:0 (invalid-name-offset) [ 2876.192190][ T3859] BPF:, 4 (invalid-name-offset) [ 2876.207743][ T3859] BPF:) [ 2876.218617][ T3859] BPF: [ 2876.228400][ T3859] BPF:Invalid arg#1 [ 2876.255683][ T3859] BPF: [ 2876.255683][ T3859] [ 2876.301130][ T3869] BPF:[1] FUNC_PROTO (anon) [ 2876.308617][ T3869] BPF:return=0 args=( [ 2876.338421][ T3869] BPF:0 (invalid-name-offset) 09:57:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000480)={r4}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x101, 0x200, 0x6, 0x6, 0x40400, 0x55a8, 0xdcf, r4}, 0x20) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r5 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r5, 0x10f, 0x84, &(0x7f0000000800), &(0x7f0000000840)=0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2876.351094][ T3873] BPF:[1] FUNC a [ 2876.359677][ T3873] BPF:type_id=0 [ 2876.373282][ T3873] BPF: [ 2876.377359][ T3869] BPF:, 4 (invalid-name-offset) [ 2876.392143][ T3873] BPF:vlen != 0 09:57:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x0, 0x0, 0xf}]}, {0x0, [0x0]}}, 0x0, 0x27, 0x0, 0x8}, 0x20) [ 2876.400254][ T3873] BPF: [ 2876.400254][ T3873] [ 2876.419444][ T3869] BPF:) 09:57:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2876.445582][ T3869] BPF: [ 2876.460826][ T3878] BPF:[1] ENUM (anon) [ 2876.463244][ T3869] BPF:Invalid arg#1 [ 2876.479782][ T3878] BPF:size=4 vlen=1 [ 2876.483501][ T3869] BPF: [ 2876.483501][ T3869] [ 2876.488413][ T3878] BPF: 09:57:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xc}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000080)=""/119, &(0x7f0000000100)=0x77) [ 2876.511183][ T3878] BPF:Invalid name [ 2876.531024][ T3878] BPF: [ 2876.531024][ T3878] [ 2876.553702][ T3884] BPF:[1] ENUM (anon) [ 2876.581197][ T3884] BPF:size=4 vlen=1 09:57:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc}, 0x20) 09:57:56 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xffffff}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2876.612214][ T3884] BPF: [ 2876.612265][ T3887] BPF:Invalid section offset [ 2876.627706][ T3888] BPF:Invalid section offset [ 2876.635602][ T3884] BPF:Invalid name [ 2876.682036][ T3884] BPF: [ 2876.682036][ T3884] 09:57:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500090000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r1, 0x41f, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000600)={r2}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002e40)={r2}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r2}, 0xc) 09:57:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2876.712209][ T3893] BPF:[1] FUNC a [ 2876.715888][ T3893] BPF:type_id=0 [ 2876.719350][ T3893] BPF: 09:57:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") ioctl(r1, 0x3, &(0x7f0000000800)="75201216690578b83febe50f2b6c74b892d9449f607c745d4b68f59137c2042d655980b862465889031153888907ccda4af374921c01856d2649c0324cd97be383cef6a7d6d35c498ab8fb22e63d2503f6d8b64c858ec1a08a533e8dceb0c12d564b4e5603d59e9f4a4c9cd374009257af657a5bc97afa604ec6d10476dd46c35096cee8826eb99e892f015fc00387b87e5068fff8abfef26a3caedba2413fb48fc5882001a5c5170ef18d68591de4d4f0978568813329c673cade71d5bfa6d9e6b3241b9d7db681c554d146d392904eaebe4c06d05bcf4d84ce30947a8da25772c1f971630b1c89a018ba7106b97c6d35ac3cea9a73b3538ac644476445453671f2fbf7b8bee7c1fa9e67e4f2089f01b417175ea1e9eaa76baee5e5d65079eec01ee6dfc7f3d6c95a122a2617a33b62fdd3d3dfdfd6b7528910e56871eb9385afdcdd3f61dbe45d762fab4770f0017fe5cb167d49156bbae0b92cdae859c5d160908b6feae7d61d133f0b9046e060294d447972eb11b06686ab281223336493aaec3a9b1d50288d7f3169a6649854d57139693825f3102634c49694d5e1ef698c6a05db8cea2dda97f8d2115ccb43b4ce57fb9dd08b902f8ab88c5bb3987a0eb55e064da1d37c5809c2ce9cbdd705404f0d3038109b26cad7fc42294e5c5046660a4a317f35a3eac93f9d14cd072474f017fbd60ac9f7c6525cecd240bbce45ff7fab9436427fcae4684b757a8197bb318beda6b9e297aa93bef2904e415058bb4029770b4559ab76246151b537f046880a5758bc8be894cac8ba9113cb5040aa18eadd716096508418e344f90dea7e255952794ed8a7a94f9347cbe820f7779ff7e28083c2cdaaa6c6c858465c1158aaa430ebeb5f45218609d042534b0ec682cdfcdcb9449bb378da34b119f00eaf871e7f579da2bd4ed74064b580e07bd7a368e0400c813d9bdf2fe77cd2fbe4e54242b78b694d8bb82dd585a0c11ef999ff1caeff726f2adb7b278b005b46ef2a7330bad0c89c34ca1fdac6457a049b55d61ef5b3a7c93aaffad95c032cd515cf96cf0a43dd7e280d27771b40560dbcb43a7837fc7bcfe105b8dfc446f0248fbfdd84e72cc85f08f394c3da2135215a7d6e56a78b236f635dfe6505c623df90ff170746fad3db93de79a7b9dcdf578f6207827cba63d91588ad843ac04a903986ece603855124b42116c86047893f435c7021500a38369aa147b7773ad38722ac8eb756836a6d6a39588bab9fa8c04bd2769184f7dec2289f34b02fe7e68fad0b9956addcb2709624c45e42a59dad76bd8b655ee0328100347e8388d5a5825f61a3bae62a55773c1d540c09cfd598cc4476cdb1a273406b9ef73866cc80224846dd788f9a1023d6b187a339af33c0d99a17aeccd720f02ab3fc88812bddced90d8f40571ba6b7f06f74906e31e41c3fa1399caa962e0a58bf05f988770c99c18a0c361608870cff6cbd443a78de6b33451de4d1890044b812b5636098f83a62aa8a9f8eb7274a3a3a5a408e53237425f70a6239c62f76c65c1d17bb86e403cb7f7a025886845aa067e499577a7b19d63805977b3ac8d0ef9889623edbc821fa75e75ec709ecd0e02d5f3a48c67c23e0deedb82f62c9c419e05dbadd61d69806d3ddcde94183c756f368ee4143b336cf572484341e3c49c11b3ca8a33cb2872b9b17dddfadb9da2a4fc7c54e70f59df9fe58863b69ec2322e2e41c64502ce7f177e9a6b89c01b861f1a8c77bba178fe8ca14da5448deacd74f8bbb55539f427061b996056979dd3e01f3603e020b59a67d766f80639de353d09f5b0d402cc80281e3f02814e4b9c385958a9a4a960532c1a7ba358978b2e77a93484496bece95a776d8b49925340fd8ec7ca8da9c949038c88052358162f93514b644bb283843bcc614a616445883edd438571193a0b806f8b1ffd456655f5847a9e0479f0bd8b3bcecc44499d0c4835c648373fc239f68cb8fe9eb79502ede9365006ba50c23f8e533b2023d5ca293881697bcb865fb0d5659884d1a994f0478a2ae8cd3ecbcbb3e270a8543f06ad8e49cef2d7bf6e39cbc67e817e3537c72063fff21f8184988b6af0aa5d7575c7a6e90bb0d1077ba67086d9e975e2a5796a1d7af6149c49a8121c1b607b975d09badcd61f20115fffbc6177738eb7a12bc857c35e4846aba4a385c9ad5dbd901a7dca92be3d9f90d784e95939b544f57babefc571b6cde4c103a365446ac4e636e1dcdf778579868ad5542b0d5894fe80b606ea786a976a21f781f9bf9ed72d16dc682e828d768da7d5871abd4219c1789e75db064ab552bc43c0eba87e055d21d9c8122beb2d251f6988e75c58952e279e6bcfc7cae5ecd2a0759471035b48b881f22b824dfcb042d5b1ff9e27903b9c0aa439d7cc084e57610aee00ca7bb01349ecf1d2aa5a925c253ba61d2563289f33a2277b84e756ccbfa8471d4e8c381dcac4e057b45d9f63640e511d469f037b9354cf192a6164b9835f2ae225eb51dc084e31b6398191cbf0555e0f3507a900d435109147a2cb116d9a6c4301316c9da82d3ec2b817d6912d173c587f9fdbce6c440f958caca70f71f07329454b64000823ab76eaa54a960eb8f7f32f2839eee2a732097bac7fa22445bac2ab2c851dc6c9f70b2df50f3188ff98339dd404271c9d3c215f1d9e9be6e80858f8de522ad1482a74669de17d27e71983239c8d06566e118e08d4879c7ce4c289bfa992acff68f9798113f9796aa5a8fc8722ee99f3f63dde15d2387cb4201363e3afdf18df90255311c798ade280f823672071348dd7e16bc357d5de2ae18fefba21ab6e557be9674dcedde375be36feb2516a11441adbaab8868d2dc6af2e74f300b84bfd0cd09aaf8a224a1f2bd3fc9bbadba95623370ee4f54d45ae60fdb23e4ba5274aa337e840b5ec96d7ec1bea7838f88d01981f5e543ca051fc2db189cde55782b767f4d0acf85327964be9e90beab4ce2d8329c003345d5ca22a19739a7c31f4bbc8c6521adbac3c039bb9497a4c584d658a183f41c999a2b7429cf5e12dfe81f1af5b69b0eff523853011cdadee59fe0aa6b9d1425b6ef5109d3b844819d36ee325e596f79f6f5cf0a7e21b1ebe2a48b3e9d15400eb35e10b646537d3b449caf21288cb54937a0e03cedd658da5286d9eba9660186483dc7ede297638b4425b0c9ff3dc98f8773f57024dd884d85949da2543a45d2a917e691a2f4a59fb09fc136f9d29a768d962dfb64d46053eacc2e036d49c92edd183550d2cae784bde258657f5d15987517281548e131566dae8d9622ecccfa772ac3f2f096a66a056c351f1ffd3abf39014604d4af828d150fae776712f4211b1d676b13e0fc46dc6bd1c6f39534194f04db200295e7b337d0639dc5a1e04e5ed19c67feeca7ad6e9f06aa45cc047286ac6b9f39b0c85ccfc5ac5f144d81667ef6713f859570911fe5221b61d94768ce17dae08905abc81f8c616153f5143673183a2ab6a9d47a3cbf112aae50f49102cbed093a7f31bd7eb56682e33d7e8f33f50e61c27d633dfcff9a5b93f0d0df9e1abc388515d02b5ca98b92e2e0ca12094e424298c0d82178558a2c3aed4c846a40c240206b66d4884fdf2414da2fbdfe58d92f32a20e5d4478c531599f6643b9bc4044d3083cef9805bfd67c3c9393f557c5401344844b0c53064b2d96c8bad8af85a661dbbbbd0c19aee3d9cb86a391166c38ec23e08e11d5e07b80110a9646bc1025abdc9caa0072ce0436e1e489eeaaebebfb2579a206ac7b961b4aac3e17cc4f5e25a67037363eb9889f2a10cf78a56e47b8d68e1dd5fa3b2cad1f1d0698f85b2fde16541cdd01bd54b7620d8d3e99397c77c2ad6ee86b48eec674a3cff93451f5be4e4d9afe1317b2ada36d8e2b2e4017d8999210a59dcf5b387f4c7ee16b490f7d9d5b49dcddaa06f8a71687ceef238ff1ca976e624adce9ec5159c008d958c1644aabbac6039328427bfbffe27af709949ea6ab70377007b1ca24665ede94c6058a7c60e41d636e985a25ae8080a923db3694801449cfbf1345cb1a07ebc8ea1e9c910adfa9f65a86726972d1be40279b077a6c5ccd50a7b57442143abf11d00c4d77cb5a40d94dc44a40e8ae7b0de2ef9261598c58d74d624b795aa017bf33cc2c7be75193439d82e8452468dabe3ff5cb1175a36c5ed886daea4ad0beaa43f63a64a42d8372a33ea140382400636e10db5d3188aec8b0e9ec7c5c911aba3b115f75e53f4b080e8fa6c301a0969b50e166fcbb3905bd5d7fb215f33a97cd79c7a0f562d552fce4a8bae6ca7453abcfa5ee2e7b2efff80be04010e49ea8d0ad959c93b7fbc4ab2fdf0087ccd842030e6a39c5e87ad72d4178370cfecbd0833189c55b2560d6ba54443059575c6d3f574469c779607f79f65f683ac3c93db92e39ac62f02a9fdbb19fde57d569492d61aaf6bd0a5f6ad63047d2f6d3b294ff619302db02bb3cf26482e432406c13ee44721baabb431f7133ec2b8efaa4efc0e0ea2b81fa5f4c2f5389f6de6fb16658d3785178883a57de70344aa21ed3ee81201bb1881d8e515038a40d7e7b603cf79667d7c9757a0dfef3b4493887f534250e4bad865ea356b3fe92ce766b077d05b5618a027c91bae124593be5dbcef0f5c0f6519d33faf28e5d878f818e98a9de855056beca5d107eaa03c5c07ec3cf828ae6fa0a0b7dec53b06eedcd4e7ed825486f420a7b2343b271a482d081002a37c25db8d3c4fb918adbe4e5c5382c0be75cca1cd501c23032f3d490ae3ac2a57dbcf4a0b2a4560a85719e75f009b3edcdaaf8d01bc43a0689c802f99e5faec10b92ac56b1830df39218ab43d1d94eaa9d93ff39ad4c3a2c43a42ea64b911e01daf4ceef7b8fd9a78e098e12d90e7a4d129b177fac96442e0c43995510e65b7a51766f0a5b583131b265e39dbc74dc13161c27951de5ebdff906ace621b83a720d04e3dea223b6535bc33ef532e602021615a1ad0613b67ba4154a0c281782c7b1d2e2dd71530fd457640c9f5f4eb68d30ea8b07c7419f58cb153872d9524c43ecd5c0b4faec4ecfb3bd4c44fee57e263e9365432b93ba459c3c9dea4a5f68391436a7e5284ac62b524118688370189b7b192959730ccab9ee098dfad900d0fa85aefcc07eaa53bf15dbadba5b238d6e7423ab221be1a34f1665b1ae5a8eb2839a62478b871689e53668c98ac577a2b2d075cb713e2b5b3b350a4fb8429ca9d1dc27595b5e0d22f48188d488fda7fe5d581e5e9668db0e529eee72c8d6a24c347c4c48796fd73620dfab21f12a7a2f89dbfc6d2d14bbc20761fa37d9716f08dc75a91e0397d921de437cebde268ecc29b6801f8e9ae643278748efccefd6d6c2e3014122a8655fe6cf2d0b297bda7ddb9a29235b65acaaee458bafaebd333c37ad4b9b14255593f0906f22b7ed398f44d953ad892a75f94dc3680784cbf31aa4358940eba1cfe96e432f0b135551dc6eef75c0a961ba04a850ac7dfd4352610d5b716bc68c6dfe581776990f8872a9af80d505bb8bdbbbd26918a16e391ef210f85a1db52e98cdf70084527ffcd966d7cb09a55107aa5a3b57daeb990bc5a2d9752d2d9e353abce5161af014f06ea8902ea6432e5c213e55e8551883c2c04d7b1a4dbe103bbfe693c43c6362d18a8f19df751c643eaadebfe8e2a4c051d93c3a1b87521eb121af54200d3d09b2bf1aa66f75e3cc4fd20564827222366f458fa61e846f9a1d748dd231155ac9db6a24e95efa80edb8ec946b2968821c0fd754cf51") ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2876.782520][ T3898] BPF:[1] FUNC_PROTO (anon) [ 2876.802719][ T3893] BPF:vlen != 0 [ 2876.809291][ T3898] BPF:return=0 args=( [ 2876.818683][ T3903] IPVS: length: 119 != 24 [ 2876.833306][ T3898] BPF:0 (invalid-name-offset) [ 2876.852271][ T3893] BPF: [ 2876.852271][ T3893] [ 2876.868509][ T3898] BPF:, 4 (invalid-name-offset) [ 2876.886168][ T3903] BPF:[1] FUNC a [ 2876.895619][ T3898] BPF:) [ 2876.898766][ T3909] BPF:[1] ENUM (anon) 09:57:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc}, 0x20) [ 2876.906334][ T3898] BPF: [ 2876.909781][ T3910] BPF:[1] DATASEC (anon) [ 2876.914698][ T3909] BPF:size=4 vlen=1 [ 2876.919030][ T3903] BPF:type_id=0 [ 2876.924147][ T3898] BPF:Invalid arg#1 [ 2876.928083][ T3909] BPF: [ 2876.933663][ T3903] BPF: [ 2876.937705][ T3909] BPF:Invalid name [ 2876.941932][ T3898] BPF: [ 2876.941932][ T3898] [ 2876.948013][ T3910] BPF:size=0 vlen=0 09:57:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2876.955394][ T3909] BPF: [ 2876.955394][ T3909] [ 2876.961753][ T3910] BPF: [ 2876.964630][ T3903] BPF:vlen != 0 [ 2876.973092][ T3913] BPF:[1] FUNC_PROTO (anon) [ 2876.977721][ T3913] BPF:return=0 args=( [ 2876.984391][ T3903] BPF: [ 2876.984391][ T3903] [ 2876.989408][ T3910] BPF:vlen == 0 09:57:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) getsockopt$inet_mreq(r2, 0x0, 0x20, &(0x7f00000000c0)={@multicast2}, &(0x7f0000000100)=0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xc}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:57:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x2e]}}, &(0x7f0000000700)=""/220, 0x30, 0xdc, 0x1008}, 0x20) [ 2877.014503][ T3910] BPF: [ 2877.014503][ T3910] [ 2877.030824][ T3913] BPF:0 (invalid-name-offset) [ 2877.048633][ T3915] BPF:[1] DATASEC (anon) [ 2877.051860][ T3913] BPF:, 4 (invalid-name-offset) [ 2877.057997][ T3913] BPF:) [ 2877.060766][ T3913] BPF: 09:57:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc}, 0x20) [ 2877.075605][ T3913] BPF:Invalid arg#1 [ 2877.084305][ T3913] BPF: [ 2877.084305][ T3913] [ 2877.101456][ T3915] BPF:size=0 vlen=0 [ 2877.105319][ T3915] BPF: [ 2877.108109][ T3915] BPF:vlen == 0 09:57:57 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:57:57 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2877.204785][ T3915] BPF: [ 2877.204785][ T3915] [ 2877.243459][ T3930] BPF:[1] FUNC a [ 2877.267722][ T3930] BPF:type_id=0 09:57:57 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008916, &(0x7f0000000080)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:57:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x9, 0x1, 0x0, 0x5, 0x1, 0x8001, [{0x7, 0x1, 0x1}]}]}}, &(0x7f0000000700)=""/220, 0x32, 0xdc, 0x8}, 0x20) [ 2877.306600][ T3935] BPF:[1] FUNC_PROTO (anon) [ 2877.314741][ T3930] BPF: [ 2877.328380][ T3935] BPF:return=0 args=( [ 2877.336968][ T3930] BPF:vlen != 0 [ 2877.348124][ T3935] BPF:0 (invalid-name-offset) 09:57:57 executing program 3 (fault-call:2 fault-nth:0): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2877.380169][ T3930] BPF: [ 2877.380169][ T3930] [ 2877.391630][ T3935] BPF:, 4 (invalid-name-offset) 09:57:57 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2877.420479][ T3935] BPF:) [ 2877.427113][ T3935] BPF: [ 2877.429985][ T3935] BPF:Invalid arg#1 [ 2877.445902][ T3935] BPF: [ 2877.445902][ T3935] [ 2877.491928][ T3945] BPF:[1] Invalid name_offset:9 [ 2877.496860][ T3949] BPF:[1] FUNC_PROTO (anon) [ 2877.507962][ T3949] BPF:return=0 args=( [ 2877.527789][ T3952] BPF:[1] Invalid name_offset:9 [ 2877.544132][ T3951] FAULT_INJECTION: forcing a failure. [ 2877.544132][ T3951] name failslab, interval 1, probability 0, space 0, times 0 [ 2877.553152][ T3949] BPF:0 (invalid-name-offset) [ 2877.557149][ T3955] BPF:[1] DATASEC (anon) [ 2877.570589][ T3955] BPF:size=0 vlen=0 [ 2877.590614][ T3955] BPF: [ 2877.599246][ T3955] BPF:vlen == 0 [ 2877.605008][ T3949] BPF:, 4 (invalid-name-offset) [ 2877.611185][ T3955] BPF: [ 2877.611185][ T3955] [ 2877.617267][ T3951] CPU: 0 PID: 3951 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2877.622583][ T3949] BPF:) [ 2877.625108][ T3951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2877.625117][ T3951] Call Trace: [ 2877.625142][ T3951] dump_stack+0x172/0x1f0 [ 2877.625167][ T3951] should_fail.cold+0xa/0x15 [ 2877.633912][ T3949] BPF: [ 2877.638014][ T3951] ? fault_create_debugfs_attr+0x180/0x180 [ 2877.638037][ T3951] ? ___might_sleep+0x163/0x2c0 [ 2877.638061][ T3951] __should_failslab+0x121/0x190 [ 2877.655042][ T3949] BPF:Invalid arg#1 [ 2877.658790][ T3951] should_failslab+0x9/0x14 [ 2877.658806][ T3951] kmem_cache_alloc_trace+0x2d3/0x790 [ 2877.658826][ T3951] ? refcount_sub_and_test_checked+0x154/0x200 [ 2877.684965][ T3949] BPF: [ 2877.684965][ T3949] [ 2877.688413][ T3951] ? refcount_dec_not_one+0x1f0/0x1f0 09:57:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000440)={0x0, 0x0}) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, 0x0, &(0x7f0000000080)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="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"], 0x44}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000600)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40004008}, 0xc, &(0x7f0000000300)={&(0x7f0000000540)={0x58, r4, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @local}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4529}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xa85}]}, 0x58}, 0x1, 0x0, 0x0, 0x800}, 0x8000) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8002}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x18c, r4, 0x8, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x228d7c8a}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x4abe1b135807bbcd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1d}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xaf3a94d397677baa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x33}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3ff}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8000}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4f}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8000}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x42}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x128}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x5}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}]}, 0x18c}, 0x1, 0x0, 0x0, 0x8800}, 0x885) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2877.688434][ T3951] btf_new_fd+0x1c9/0x1d10 [ 2877.688453][ T3951] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2877.709030][ T3951] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2877.715293][ T3951] ? apparmor_capable+0x2ed/0x630 [ 2877.720336][ T3951] ? cap_capable+0x205/0x270 [ 2877.724953][ T3951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2877.731301][ T3951] ? btf_type_seq_show+0x1b0/0x1b0 [ 2877.736437][ T3951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2877.742687][ T3951] ? ns_capable_common+0x93/0x100 [ 2877.742707][ T3951] __do_sys_bpf+0x1328/0x3350 [ 2877.742725][ T3951] ? bpf_prog_load+0x16c0/0x16c0 [ 2877.742739][ T3951] ? __kasan_check_write+0x14/0x20 [ 2877.742755][ T3951] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2877.742771][ T3951] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2877.742786][ T3951] ? wait_for_completion+0x440/0x440 [ 2877.742808][ T3951] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2877.752488][ T3951] ? fput_many+0x12c/0x1a0 [ 2877.752520][ T3951] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2877.752533][ T3951] ? do_syscall_64+0x26/0x760 [ 2877.752549][ T3951] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2877.752562][ T3951] ? do_syscall_64+0x26/0x760 [ 2877.752582][ T3951] __x64_sys_bpf+0x73/0xb0 [ 2877.752598][ T3951] do_syscall_64+0xfa/0x760 [ 2877.752616][ T3951] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2877.752632][ T3951] RIP: 0033:0x459f39 [ 2877.829393][ T3951] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2877.849012][ T3951] RSP: 002b:00007f88aaa44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2877.857442][ T3951] RAX: ffffffffffffffda RBX: 00007f88aaa44c90 RCX: 0000000000459f39 [ 2877.865428][ T3951] RDX: 0000000000000020 RSI: 0000000020000400 RDI: 0000000000000012 [ 2877.873442][ T3951] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2877.879834][ T3955] BPF:[1] DATASEC (anon) [ 2877.881419][ T3951] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f88aaa456d4 09:57:57 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x2000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2877.881428][ T3951] R13: 00000000004c0368 R14: 00000000004d2738 R15: 0000000000000004 09:57:57 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2877.963874][ T3966] BPF:[1] FUNC_PROTO (anon) [ 2877.974164][ T3955] BPF:size=0 vlen=0 [ 2877.981932][ T3930] BPF:[1] FUNC a [ 2877.985612][ T3930] BPF:type_id=0 [ 2877.989079][ T3930] BPF: [ 2877.989675][ T3955] BPF: [ 2878.001364][ T3966] BPF:return=0 args=( [ 2878.004992][ T3955] BPF:vlen == 0 [ 2878.008966][ T3966] BPF:0 (invalid-name-offset) [ 2878.021118][ T3966] BPF:, 4 (invalid-name-offset) [ 2878.023643][ T3955] BPF: [ 2878.023643][ T3955] [ 2878.026111][ T3966] BPF:) [ 2878.041046][ T3930] BPF:vlen != 0 [ 2878.044650][ T3930] BPF: [ 2878.044650][ T3930] [ 2878.049664][ T3966] BPF: [ 2878.060532][ T3966] BPF:Invalid arg#1 [ 2878.071049][ T3966] BPF: [ 2878.071049][ T3966] [ 2878.079316][ T3970] BPF:[1] FUNC_PROTO (anon) [ 2878.089327][ T3972] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 2878.091020][ T3970] BPF:return=0 args=( 09:57:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xc}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000080)=0x7, 0x4) 09:57:58 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000e0a69c14000000000c00006e0d78ccd8000c000000020000000000000000"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2878.123343][ T3970] BPF:0 (invalid-name-offset) [ 2878.132726][ T3970] BPF:, 4 (invalid-name-offset) [ 2878.140265][ T3970] BPF:) [ 2878.144374][ T3970] BPF: [ 2878.149515][ T3970] BPF:Invalid arg#1 [ 2878.154051][ T3972] BPF:[1] ENUM (anon) [ 2878.158353][ T3970] BPF: [ 2878.158353][ T3970] 09:57:58 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2878.226688][ T3978] BPF:Invalid section offset [ 2878.241632][ T3972] BPF:size=4 vlen=1 [ 2878.266291][ T3980] BPF:Invalid section offset 09:57:58 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2878.284389][ T3972] BPF: 09:57:58 executing program 3 (fault-call:2 fault-nth:1): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2878.305554][ T3972] BPF:Invalid name 09:57:58 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000e3ffff0b1b00000000e0ffffffffffffff000000000000d28ace3d82f758"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2878.350188][ T3982] BPF:[1] FUNC_PROTO (anon) [ 2878.356134][ T3972] BPF: [ 2878.356134][ T3972] [ 2878.431047][ T3982] BPF:return=0 args=( [ 2878.460707][ T3982] BPF:0 (invalid-name-offset) [ 2878.480341][ T3993] BPF:[1] FUNC a [ 2878.496856][ T3993] BPF:type_id=0 [ 2878.500494][ T3982] BPF:, 4 (invalid-name-offset) [ 2878.500501][ T3982] BPF:) [ 2878.500508][ T3982] BPF: 09:57:58 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2878.500524][ T3982] BPF:Invalid arg#1 [ 2878.511603][ T3993] BPF: [ 2878.518045][ T3993] BPF:vlen != 0 [ 2878.524826][ T3994] FAULT_INJECTION: forcing a failure. [ 2878.524826][ T3994] name failslab, interval 1, probability 0, space 0, times 0 [ 2878.528991][ T3993] BPF: [ 2878.528991][ T3993] [ 2878.555935][ T3982] BPF: [ 2878.555935][ T3982] [ 2878.561970][ T3996] BPF:btf_header not found [ 2878.568622][ T3995] BPF:[1] FUNC a [ 2878.571267][ T3994] CPU: 1 PID: 3994 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2878.578049][ T3995] BPF:type_id=0 [ 2878.580083][ T3994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2878.580089][ T3994] Call Trace: [ 2878.580114][ T3994] dump_stack+0x172/0x1f0 [ 2878.580139][ T3994] should_fail.cold+0xa/0x15 [ 2878.589647][ T3995] BPF: [ 2878.593652][ T3994] ? fault_create_debugfs_attr+0x180/0x180 [ 2878.593674][ T3994] ? ___might_sleep+0x163/0x2c0 [ 2878.593693][ T3994] __should_failslab+0x121/0x190 [ 2878.593716][ T3994] should_failslab+0x9/0x14 [ 2878.601534][ T3995] BPF:vlen != 0 [ 2878.605904][ T3994] kmem_cache_alloc_trace+0x2d3/0x790 [ 2878.605921][ T3994] ? refcount_sub_and_test_checked+0x154/0x200 [ 2878.605942][ T3994] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2878.614912][ T3995] BPF: [ 2878.614912][ T3995] [ 2878.619334][ T3994] btf_new_fd+0x424/0x1d10 [ 2878.619354][ T3994] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2878.619368][ T3994] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2878.619387][ T3994] ? apparmor_capable+0x2ed/0x630 [ 2878.675707][ T3994] ? cap_capable+0x205/0x270 [ 2878.680309][ T3994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2878.686549][ T3994] ? btf_type_seq_show+0x1b0/0x1b0 [ 2878.686565][ T3994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2878.686578][ T3994] ? ns_capable_common+0x93/0x100 [ 2878.686598][ T3994] __do_sys_bpf+0x1328/0x3350 [ 2878.707712][ T3994] ? bpf_prog_load+0x16c0/0x16c0 [ 2878.712666][ T3994] ? __kasan_check_write+0x14/0x20 [ 2878.717795][ T3994] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2878.723366][ T3994] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2878.728675][ T3994] ? wait_for_completion+0x440/0x440 [ 2878.733983][ T3994] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2878.740242][ T3994] ? fput_many+0x12c/0x1a0 [ 2878.744688][ T3994] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2878.750165][ T3994] ? do_syscall_64+0x26/0x760 [ 2878.754858][ T3994] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 09:57:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xc}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) ioctl$sock_proto_private(r0, 0x89ee, &(0x7f0000000080)="bedcacdbc431f1f4ccba5fb7c7092bc3012f9babbfd5be50e1403ed61e85023c6cefb67644fa9914557c8b8beb49bb233da954547a981836e4205dd3236dc8c1ba119511c4785fb9f6ba9bbeedaa0bf7e1c79ce2b0bc8b4940fdc280cf223913b018a275") [ 2878.760936][ T3994] ? do_syscall_64+0x26/0x760 [ 2878.765636][ T3994] __x64_sys_bpf+0x73/0xb0 [ 2878.770072][ T3994] do_syscall_64+0xfa/0x760 [ 2878.774590][ T3994] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2878.780577][ T3994] RIP: 0033:0x459f39 [ 2878.784480][ T3994] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2878.787136][ T3974] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 2878.804098][ T3994] RSP: 002b:00007f88aaa44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2878.804114][ T3994] RAX: ffffffffffffffda RBX: 00007f88aaa44c90 RCX: 0000000000459f39 [ 2878.804120][ T3994] RDX: 0000000000000020 RSI: 0000000020000400 RDI: 0000000000000012 [ 2878.804127][ T3994] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2878.804134][ T3994] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f88aaa456d4 [ 2878.804142][ T3994] R13: 00000000004c0368 R14: 00000000004d2738 R15: 0000000000000004 [ 2878.826794][ T3999] BPF:Unsupported version [ 2878.838008][ T4001] BPF:[1] FUNC_PROTO (anon) [ 2878.852261][ T4002] BPF:btf_header not found [ 2878.864122][ T4003] BPF:[1] FUNC a [ 2878.875252][ T4001] BPF:return=0 args=( [ 2878.884695][ T4003] BPF:type_id=0 [ 2878.888205][ T4004] BPF:Unsupported version [ 2878.888334][ T4003] BPF: [ 2878.896507][ T4001] BPF:0 (invalid-name-offset) [ 2878.903053][ T4003] BPF:vlen != 0 [ 2878.906669][ T4001] BPF:, 4 (invalid-name-offset) [ 2878.912490][ T4003] BPF: [ 2878.912490][ T4003] [ 2878.918506][ T4001] BPF:) [ 2878.922819][ T4001] BPF: [ 2878.927068][ T4006] BPF:[1] FUNC a [ 2878.930719][ T4006] BPF:type_id=0 [ 2878.934479][ T4007] BPF:[1] ENUM (anon) [ 2878.939932][ T4001] BPF:Invalid arg#1 [ 2878.944796][ T4006] BPF: [ 2878.947698][ T4001] BPF: [ 2878.947698][ T4001] [ 2878.953008][ T4006] BPF:vlen != 0 [ 2878.956612][ T4007] BPF:size=4 vlen=1 [ 2878.961296][ T4006] BPF: 09:57:58 executing program 5: r0 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x60, 0x800) ioctl(r0, 0x100000003, &(0x7f0000000080)="0800b5055e0bcfe873e471") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2878.961296][ T4006] [ 2878.986944][ T4007] BPF: [ 2878.998115][ T4007] BPF:Invalid name [ 2879.053629][ T4007] BPF: [ 2879.053629][ T4007] 09:57:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) socket$bt_rfcomm(0x1f, 0xf97e5e74fd7dc9d8, 0x3) 09:57:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:57:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = accept(r0, &(0x7f00000004c0)=@nfc_llcp, &(0x7f0000000540)=0x80) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) accept$alg(r2, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000600)={r2, r3, 0x867, 0x4a, &(0x7f0000000580)="e24ed0133b03000e10ce9c9417ba70bb26cdb84cfed8443ad2c5ffe37d8035db2460ffc93adf853e8601f5a0e7c247e086898e2467c5d178546a77a65cec344268d18581b5eadc682f44", 0x41, 0xa4, 0x80, 0x0, 0x2, 0x2, 0x1e, 'syz1\x00'}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r5 = accept$alg(r4, 0x0, 0x0) getsockopt(r3, 0x7, 0xb3d2, &(0x7f00000019c0)=""/241, &(0x7f0000000300)=0xf1) r6 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r6, &(0x7f00000002c0), 0xfefe) sendfile(r5, r6, &(0x7f0000000000), 0xffe) pwritev(r5, &(0x7f0000000440)=[{&(0x7f0000000080)="34b59e7f11ab88bc3571e9c769e46dfccc52d6d95d92db61d772417a64dd8bb8662f5797ee0e44bc3df5382eb97c5316e18e1844ae1a0df8c3b20951f004b53960adec66c10586cac42813d8a2f0d96a9dc524a6716efc4c6d649b2c291b58b3cca87ac767071227cde8db46cff1edf098fb7b21305794a323af889a3009", 0x7e}, {&(0x7f0000000100)="be3a19454c37f382685cbc2c0ee7eab0b80e60c3f94c21c10de426b031cffc22ecf3f9c9dacb5295348e5e8b737ca2899b00ddf3f20fde73c0f8c597bf418b2bb62a802f94272f01795316af474223bd57ccece30998e04e9d31baa969829c11acb85d2d729c654353e2f07a8eef13bc0deba06824ebb9430dd678ff3683386b0c048024b35a99fd83a9f5f1530494bd96a6c5999c6f63da0391b1ad2551cae8aa084ac0a9fc562dd5de2b82718dc4d993d9", 0xb2}, {&(0x7f00000001c0)="770e705ddf999376ff7b6abba607d1e9d0de737f6a761c3ed1760745eba215c8589c17", 0x23}, {&(0x7f0000000200)="55a481ae0f67f9bce660471a5b9be903123376d006d06deca5ea083a3801869654dd36f9d79fb18a842983c98e2c757bed26f01c4dc299877becff0510446389a98c8a189979d2692f4138ede9b2f27f8d360cc88460", 0x56}, {&(0x7f0000000800)="c29f49b104e2673fcad185f82edb378cc20f856a04df00a2bc39f921f2be8f0a2e6c25980ebb34c6b5f0de087ada742f0d0309e8b4b9fc5b5824a2b0ebe775a5b40ac6ebdad5753a99fff63c23985055490db5383997eda910b02aba897b84d586237ebb62a86d25c90e37a9060b57d009a27d694ab4fd777b4ef10c04abffdca062b6cf8d212332811ea17486ae62ee8a56bdfcd76a90269c709368f5dcabd67d864988da6977ef2cbc062ca6c4fc4e9d858e0d01d83d3ac2a04d00e640564ec2c11f8d9c154de19debddff5d675cfae9a7462f712f4013a7f31887efe45fa49222477c977d6580", 0xe8}, {&(0x7f0000000280)="ca3a295a8c02b7c32d241c057982f727ddbd2043d82b8da65185df1b9ae5e9d971ff27b9b3fbea6c318d4bb2592cba698074500c8f21653334f39e1009d07aebb85b0b04dc4121ee8df4cae842ae9fa096", 0x51}, {&(0x7f0000000900)="6e7b2ec516cddb692d2a55478ea3e4b14f71069ffa7a3961e9b63c89923c018b436527817530fe2eadea9bdce0e509ab19fcb624f70e7957b567eccc8e76f2ef6168eaf01b9a045e66f9175f9dc461d8717905a509b27e9bb22294dbaf5f261686da439acbd24f69c7a9d5dba06c75015f311784cc32d05acbf4c07a9dd26c5e99bd0060929eb386628c8c88f8083001ff4b18eff56cc897be6f62c470", 0x9d}, {&(0x7f00000009c0)="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", 0x1000}], 0x8, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xc}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:57:59 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0xc, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2879.095507][ T4013] BPF:[1] DATASEC (anon) [ 2879.099902][ T4013] BPF:size=0 vlen=0 [ 2879.125031][ T4013] BPF: [ 2879.141401][ T4013] BPF:vlen == 0 [ 2879.158881][ T4013] BPF: [ 2879.158881][ T4013] [ 2879.170121][ T4018] BPF:[1] FUNC a [ 2879.175783][ T4019] BPF:[1] FUNC_PROTO (anon) [ 2879.180414][ T4019] BPF:return=0 args=( [ 2879.184863][ T4018] BPF:type_id=0 [ 2879.188334][ T4018] BPF: [ 2879.193037][ T4020] BPF:[1] DATASEC (anon) [ 2879.197482][ T4020] BPF:size=0 vlen=0 [ 2879.202123][ T4019] BPF:0 (invalid-name-offset) 09:57:59 executing program 3 (fault-call:2 fault-nth:2): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2879.206934][ T4018] BPF:vlen != 0 [ 2879.210464][ T4018] BPF: [ 2879.210464][ T4018] [ 2879.216245][ T4020] BPF: [ 2879.216518][ T4021] BPF:Unsupported version [ 2879.219115][ T4019] BPF:, 4 (invalid-name-offset) [ 2879.228730][ T4020] BPF:vlen == 0 [ 2879.232715][ T4019] BPF:) [ 2879.237447][ T4020] BPF: [ 2879.237447][ T4020] [ 2879.261474][ T4019] BPF: [ 2879.264337][ T4019] BPF:Invalid arg#1 [ 2879.285093][ T4025] BPF:Unsupported version [ 2879.294201][ T4019] BPF: [ 2879.294201][ T4019] 09:57:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) getsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0x4) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) pipe(&(0x7f0000000200)={0xffffffffffffffff}) write$cgroup_int(r3, &(0x7f0000000080), 0x12) ioctl$EXT4_IOC_SETFLAGS(r2, 0x6628, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e22, 0x3, @dev={0xfe, 0x80, [], 0x17}, 0x5}, {0xa, 0x4e21, 0x4, @remote, 0x3ff}, 0x81, [0xfffffbff, 0x3ff, 0x9, 0x7, 0x3, 0x3, 0x200, 0x1000]}, 0x5c) bind$tipc(r1, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x61, 0x2}, 0x2}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x0, 0x0, 0xc, 0x0, 0x1}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2879.317624][ T4027] BPF:[1] FUNC_PROTO (anon) 09:57:59 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0xd, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:57:59 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000080), 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100a2a96588c63239450c0000000c00000002000000000000000000000f000000000000"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2879.340994][ T4027] BPF:return=0 args=( [ 2879.345035][ T4027] BPF:0 (invalid-name-offset) [ 2879.349721][ T4027] BPF:, 4 (invalid-name-offset) [ 2879.389359][ T4030] FAULT_INJECTION: forcing a failure. [ 2879.389359][ T4030] name failslab, interval 1, probability 0, space 0, times 0 [ 2879.406085][ T4027] BPF:) [ 2879.408904][ T4027] BPF: [ 2879.449618][ T4030] CPU: 1 PID: 4030 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2879.457520][ T4030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2879.467591][ T4030] Call Trace: [ 2879.470913][ T4030] dump_stack+0x172/0x1f0 [ 2879.475264][ T4030] should_fail.cold+0xa/0x15 [ 2879.479850][ T4030] ? fault_create_debugfs_attr+0x180/0x180 [ 2879.485650][ T4030] ? ___might_sleep+0x163/0x2c0 [ 2879.490494][ T4030] __should_failslab+0x121/0x190 [ 2879.495431][ T4030] should_failslab+0x9/0x14 [ 2879.499917][ T4030] kmem_cache_alloc_node_trace+0x274/0x750 [ 2879.505712][ T4030] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2879.511676][ T4030] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2879.517470][ T4030] __kmalloc_node+0x3d/0x70 [ 2879.521974][ T4030] kvmalloc_node+0x68/0x100 [ 2879.526462][ T4030] btf_new_fd+0x468/0x1d10 [ 2879.530972][ T4030] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2879.536935][ T4030] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2879.543162][ T4030] ? apparmor_capable+0x2ed/0x630 [ 2879.548168][ T4030] ? cap_capable+0x205/0x270 [ 2879.552744][ T4030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2879.558991][ T4030] ? btf_type_seq_show+0x1b0/0x1b0 [ 2879.564103][ T4030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2879.570336][ T4030] ? ns_capable_common+0x93/0x100 [ 2879.575365][ T4030] __do_sys_bpf+0x1328/0x3350 [ 2879.580033][ T4030] ? bpf_prog_load+0x16c0/0x16c0 [ 2879.585056][ T4030] ? __kasan_check_write+0x14/0x20 [ 2879.590163][ T4030] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2879.595696][ T4030] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2879.600967][ T4030] ? wait_for_completion+0x440/0x440 [ 2879.606242][ T4030] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2879.612467][ T4030] ? fput_many+0x12c/0x1a0 [ 2879.616875][ T4030] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2879.622333][ T4030] ? do_syscall_64+0x26/0x760 [ 2879.627002][ T4030] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2879.634021][ T4030] ? do_syscall_64+0x26/0x760 [ 2879.638687][ T4030] __x64_sys_bpf+0x73/0xb0 [ 2879.643090][ T4030] do_syscall_64+0xfa/0x760 [ 2879.647581][ T4030] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2879.653478][ T4030] RIP: 0033:0x459f39 [ 2879.657364][ T4030] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2879.676952][ T4030] RSP: 002b:00007f88aaa23c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2879.685354][ T4030] RAX: ffffffffffffffda RBX: 00007f88aaa23c90 RCX: 0000000000459f39 [ 2879.693308][ T4030] RDX: 0000000000000020 RSI: 0000000020000400 RDI: 0000000000000012 [ 2879.701269][ T4030] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2879.709234][ T4030] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f88aaa246d4 [ 2879.717190][ T4030] R13: 00000000004c0368 R14: 00000000004d2738 R15: 0000000000000003 [ 2879.730475][ T4037] BPF:Unsupported version [ 2879.745682][ T4027] BPF:Invalid arg#1 [ 2879.768709][ T4027] BPF: [ 2879.768709][ T4027] [ 2879.779701][ T4042] BPF:Unsupported version [ 2879.781367][ T4041] BPF:[1] FUNC a [ 2879.795169][ T4041] BPF:type_id=1 [ 2879.805731][ T4044] BPF:[1] ENUM (anon) 09:57:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:57:59 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2879.821125][ T4041] BPF: [ 2879.825700][ T4044] BPF:size=4 vlen=1 [ 2879.832516][ T4041] BPF:Invalid type_id [ 2879.836631][ T4041] BPF: [ 2879.836631][ T4041] [ 2879.844277][ T4044] BPF: [ 2879.860991][ T4044] BPF:Invalid name [ 2879.887136][ T4044] BPF: [ 2879.887136][ T4044] [ 2879.895101][ T4043] BPF:btf_header not found [ 2879.923464][ T4045] BPF:[1] ENUM (anon) [ 2879.949282][ T4045] BPF:size=4 vlen=1 [ 2879.957034][ T4050] BPF:[1] FUNC_PROTO (anon) [ 2879.979060][ T4050] BPF:return=0 args=( [ 2879.993626][ T4050] BPF:0 (invalid-name-offset) 09:58:00 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2880.004233][ T4045] BPF: [ 2880.012357][ T4050] BPF:, 4 (invalid-name-offset) [ 2880.018413][ T4045] BPF:Invalid name [ 2880.023149][ T4050] BPF:) [ 2880.028431][ T4050] BPF: [ 2880.037370][ T4045] BPF: [ 2880.037370][ T4045] [ 2880.038866][ T4050] BPF:Invalid arg#1 [ 2880.060154][ T4050] BPF: [ 2880.060154][ T4050] 09:58:00 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2880.088605][ T4053] BPF:[1] FUNC_PROTO (anon) [ 2880.120753][ T4053] BPF:return=0 args=( [ 2880.151415][ T4056] BPF:Unsupported flags [ 2880.162507][ T4053] BPF:0 (invalid-name-offset) [ 2880.184777][ T4058] BPF:Unsupported flags [ 2880.215122][ T4061] BPF:[1] FUNC a [ 2880.217004][ T4053] BPF:, 4 (invalid-name-offset) [ 2880.223578][ T4061] BPF:type_id=1 [ 2880.231364][ T4062] BPF:[1] ENUM (anon) [ 2880.235672][ T4062] BPF:size=4 vlen=1 [ 2880.240785][ T4061] BPF: [ 2880.244386][ T4062] BPF: [ 2880.249630][ T4062] BPF:Invalid name [ 2880.254942][ T4061] BPF:Invalid type_id [ 2880.259132][ T4062] BPF: [ 2880.259132][ T4062] 09:58:00 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2880.260786][ T4043] BPF:btf_header not found [ 2880.265277][ T4061] BPF: [ 2880.265277][ T4061] [ 2880.270661][ T4053] BPF:) [ 2880.284634][ T4053] BPF: [ 2880.287446][ T4053] BPF:Invalid arg#1 09:58:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9f070200180000000000000001000000b1aa0000020000000700000000000006040000200000"], &(0x7f00000000c0)=""/230, 0x26, 0xdc, 0x8}, 0x20) [ 2880.320021][ T4053] BPF: [ 2880.320021][ T4053] 09:58:00 executing program 5: socket$bt_bnep(0x1f, 0x3, 0x4) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r0, &(0x7f0000000080)="54aaac46ee0a062c7c721812b2bdff76275c1293ae7c2832cf9251f7ed16e6adfe6a9351b134501c5f854aa10ee76ae238d3c36f8630a0885447d18546f00c1d5f0f8fec981d6b2225fcecefafa0ab3879353c26e12494da8b3cc9913090ac852c79e59b585bc9ee10be3b10d693de4a51d6ca36dc4cd99e22320c534230c45d9aea917231e5048fa1102e097b1e100ad2f18ca50eafb8cd269d10021ca0620a5121c27d56944799eec16ef19b22c9ac7c603b31c8795166679ddbaa3aef857a1e00358bfc6832fb8031eba99b4b22294a", 0xd1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:58:00 executing program 4: r0 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @bcast}, [@rose, @rose, @null, @null, @default, @default, @remote, @default]}, &(0x7f0000000000)=0x48, 0x800) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000180), 0x4) syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r2 = socket(0xa, 0x809, 0x8) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) accept$alg(r3, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000002800)={0x0, r3, 0x4, 0x6b14, 0x80, 0x5d4}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000084020000010000000000000c00000000006100b615168305c4cd162440398c0f81d4"], &(0x7f0000000700)=""/206, 0x27, 0xce, 0x8}, 0x20) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) accept$alg(r4, 0x0, 0x0) shutdown(r4, 0x0) [ 2880.402950][ T4065] BPF:Unsupported flags [ 2880.419037][ T4069] BPF:Unsupported flags [ 2880.436722][ T4068] BPF:Invalid magic [ 2880.459593][ T4071] BPF:Invalid magic [ 2880.587809][ T4079] BPF:[1] DATASEC (anon) [ 2880.593587][ T4080] BPF:Total section length too long [ 2880.599706][ T4079] BPF:size=0 vlen=0 [ 2880.604368][ T4079] BPF: [ 2880.607314][ T4079] BPF:vlen == 0 [ 2880.612533][ T4079] BPF: [ 2880.612533][ T4079] [ 2880.619612][ T4082] BPF:[1] DATASEC (anon) [ 2880.624202][ T4082] BPF:size=0 vlen=0 [ 2880.628175][ T4082] BPF: [ 2880.631280][ T4082] BPF:vlen == 0 [ 2880.634905][ T4082] BPF: [ 2880.634905][ T4082] 09:58:00 executing program 3 (fault-call:2 fault-nth:3): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:00 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x6000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:00 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r2, r3, &(0x7f0000000000), 0xffe) accept(r2, 0x0, &(0x7f0000000280)) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r5, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r5, 0x6628, 0x0) sendmsg$nfc_llcp(r5, &(0x7f00000003c0)={&(0x7f0000000440)={0x27, 0x1, 0x1, 0x2, 0x9, 0x0, "92727c3e2e7723fc9d222a825c1525cf5f87e98b8a1ddf27fac3d59dcc64d8cd88b1723782ac19b048588abeb36bb74463c6b006e39c475b9a90f1983e10e9", 0x30}, 0x60, &(0x7f0000000300), 0x0, &(0x7f0000000580)={0x100, 0x88, 0xfdd, "778c0af3d32520964f4440684f73c869b049c0d412555c6596e108e3192db7c702fcaafc7fa6bafd3562f155886147e4134f4c0f2c3d9642d61cd5c9a661a15395ad5150040148341dd206e5baa81be96398dc1e0d80c8b1d9c6c00faf7771f1d5f1b801c0075baf7357520a623720682382f2b654e4280a7e9fe564e837b863018117d3c6943ec824e708e4acd1990b4799d04b05f337cbcb1da760444845188d713f877d53513bfa15d6e95a59e5d8fe670fe2624308b5fa394e642bb4f7baa7b6d2b3ba395fc2f70304682cefa20fe092922a96ac5cce79fd561b9ec9044368a7bb6f2da35cf9dcb673afddb3"}, 0x100, 0x800}, 0x4000000) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, &(0x7f0000000080)={0x4, 0x0, 0x7, 0xe7, 0x2, [{0xffffffff, 0x10000, 0xfffffffffffff924, 0x0, 0x0, 0x102}, {0x2, 0x7d, 0x6, 0x0, 0x0, 0x29f388b0df0b5bde}]}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x40086602, &(0x7f0000000140)={0x0, 0x1, 0x0, 0x1f}) write$cgroup_int(r6, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r6, 0x6628, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r7, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r7, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r7, 0x6628, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000900)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r8, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r8, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r8, 0x6628, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r8, 0x5411, &(0x7f00000006c0)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") setsockopt$inet_mreqsrc(r4, 0x0, 0x35, &(0x7f0000000000)={@remote, @local, @empty}, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400000000000100000604000000000000000000000000001ae23f73942236e82722fa4ffbc9eabd41e2655df337eb83d53c4188601fa0e2607597625cad40d4f4ffba13d0fb66d1ead6cb7135d2b79e936ba3dcf160536ec4b676773794baa098d9365c90023731c49e78a2770649c5ac3709603128b30b46e9606938bed84a523d3fca66666fd2148efb8bab6a40b8802273262e5724806678d81073ec229031204196049cca6b3fe7b1558046b9bbf2b6271278146e6d85586d6ded17c3a4"], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r9, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r9, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r9, 0x6628, 0x0) bind$tipc(r9, &(0x7f0000000800)=@name={0x1e, 0x2, 0x0, {{0x1}, 0x4}}, 0xfffffe6a) 09:58:00 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1c, 0x100000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x6628, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x2) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0x3, 0x8202, 0x7ff, 0xfffffffc, r3}, 0x10) [ 2880.680504][ T4086] BPF:Total section length too long 09:58:00 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000002c0), 0xfefe) sendfile(r3, r4, &(0x7f0000000000), 0xffe) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000001c0)={'ifb0\x00', &(0x7f0000000180)=@ethtool_sset_info={0x37, 0xf3, 0x800, [0x1, 0x0, 0xff, 0x8, 0x7fff]}}) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000480)={r7}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000080)=@sack_info={r7, 0x9d3, 0x1}, 0xc) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r8, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r8, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r8, 0x6628, 0x0) getsockopt$bt_BT_VOICE(r8, 0x112, 0xb, &(0x7f00000000c0)=0x1000, &(0x7f0000000100)=0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000000000200000c00000000006103a144bcce2218245798"], &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2880.809945][ T4093] BPF:[1] FUNC_PROTO (anon) [ 2880.820499][ T4096] BPF:[1] DATASEC (anon) [ 2880.828988][ T4093] BPF:return=0 args=( [ 2880.837805][ T4095] BPF:Unsupported flags [ 2880.838449][ T4099] BPF:[1] DATASEC (anon) [ 2880.848732][ T4099] BPF: [ 2880.851116][ T4096] BPF:size=0 vlen=0 [ 2880.855210][ T4099] BPF:meta_left:0 meta_needed:24 [ 2880.858699][ T4103] BPF:Unsupported flags [ 2880.868355][ T4093] BPF:0 (invalid-name-offset) [ 2880.877021][ T4096] BPF: [ 2880.879827][ T4096] BPF:vlen == 0 [ 2880.880280][ T4099] BPF: [ 2880.880280][ T4099] 09:58:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2880.909567][ T4093] BPF:, 4 (invalid-name-offset) [ 2880.921003][ T4096] BPF: [ 2880.921003][ T4096] [ 2880.929636][ T4093] BPF:) [ 2880.934206][ T4105] BPF:Invalid section offset [ 2880.939383][ T4093] BPF: 09:58:00 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2880.973725][ T4093] BPF:Invalid arg#1 [ 2880.978774][ T4093] BPF: [ 2880.978774][ T4093] [ 2881.035260][ T4110] BPF:[1] DATASEC (anon) [ 2881.036832][ T4107] BPF:Total section length too long [ 2881.054948][ T4110] BPF: [ 2881.055713][ T4111] BPF:[1] FUNC_PROTO (anon) [ 2881.066875][ T4110] BPF:meta_left:0 meta_needed:24 [ 2881.085642][ T4110] BPF: [ 2881.085642][ T4110] [ 2881.098770][ T4111] BPF:return=0 args=( [ 2881.101412][ T4113] BPF:Unsupported flags [ 2881.114393][ T4111] BPF:0 (invalid-name-offset) [ 2881.119477][ T4115] BPF:Unsupported flags [ 2881.127415][ T4111] BPF:, 4 (invalid-name-offset) 09:58:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:01 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x12, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2881.140242][ T4111] BPF:) [ 2881.149952][ T4111] BPF: [ 2881.159689][ T4111] BPF:Invalid arg#1 [ 2881.170434][ T4111] BPF: [ 2881.170434][ T4111] 09:58:01 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2881.322940][ T4120] BPF:Unsupported flags [ 2881.338089][ T4124] BPF:Unsupported flags 09:58:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2881.397282][ T4126] BPF:[1] FUNC_PROTO (anon) [ 2881.414171][ T4126] BPF:return=0 args=( 09:58:01 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xdb, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2881.440716][ T4126] BPF:0 (invalid-name-offset) [ 2881.465388][ T4126] BPF:, 4 (invalid-name-offset) [ 2881.499113][ T4126] BPF:) [ 2881.513877][ T4126] BPF: [ 2881.528261][ T4126] BPF:Invalid arg#1 09:58:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2881.548373][ T4126] BPF: [ 2881.548373][ T4126] [ 2881.562176][ T4133] BPF:Unsupported flags [ 2881.568667][ T4134] BPF:Unsupported flags [ 2881.592845][ T4136] BPF:[1] FUNC_PROTO (anon) [ 2881.629568][ T4107] BPF:Total section length too long [ 2881.640470][ T4105] BPF:Invalid section offset [ 2881.641111][ T4104] BPF:[1] DATASEC (anon) [ 2881.649451][ T4104] BPF:size=0 vlen=0 [ 2881.660194][ T4136] BPF:return=0 args=( 09:58:01 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x2a, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000200000000000000010000060400"/35], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) accept4$bt_l2cap(r1, 0x0, &(0x7f0000000000), 0x400) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000000c0), 0x2) bind$isdn_base(r1, &(0x7f0000000100)={0x22, 0x3f, 0x52, 0x7, 0x7}, 0x6) [ 2881.689424][ T4136] BPF:0 (invalid-name-offset) [ 2881.708431][ T4136] BPF:, 4 (invalid-name-offset) [ 2881.729402][ T4136] BPF:) [ 2881.757998][ T4104] BPF: [ 2881.771151][ T4104] BPF:vlen == 0 [ 2881.778294][ T4136] BPF: [ 2881.792863][ T4143] BPF:Unsupported btf_header [ 2881.793298][ T4136] BPF:Invalid arg#1 [ 2881.801865][ T4104] BPF: [ 2881.801865][ T4104] [ 2881.825530][ T4145] BPF:Unsupported btf_header [ 2881.859873][ T4136] BPF: [ 2881.859873][ T4136] 09:58:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0b080000007167419ee4baf7b49c8ff07e120362da31ac005fdeb34f075c56c57c5f756ac6c3e1e69ced398aa8131a17eba3b877432f7a8c202e77658ffd66ba3213644ae4a720c56138cbee9c64f064e9d6c7fb85fa51adf885f72e930c42bf7c5303a67c3ffb5bdb212694c00300000000000000ad5df922bfe7187db929d4d067115c225b4aaa95bce673121113731eddd5ef2086d6a413c2d81ef946eda0959f56804d2716d6a6f14361af916289b583a5c718edd2b33e5810a866f5fe180b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:58:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:01 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9fef0100180000008bfa6233aafa2a000000000c0000001c0000000300009de9bd630002000047"], &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:01 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:01 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x8000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2882.034771][ T4158] BPF:Invalid section offset 09:58:02 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2882.080814][ T4160] BPF:[1] FUNC_PROTO (anon) [ 2882.087041][ T4160] BPF:return=0 args=( [ 2882.108694][ T4160] BPF:0 (invalid-name-offset) [ 2882.131755][ T4160] BPF:, 4 (invalid-name-offset) [ 2882.171238][ T4160] BPF:) [ 2882.183156][ T4160] BPF: [ 2882.200106][ T4160] BPF:Invalid arg#1 [ 2882.213533][ T4165] BPF:Unsupported section found [ 2882.221092][ T4160] BPF: [ 2882.221092][ T4160] [ 2882.264917][ T4172] BPF:Unsupported section found [ 2882.281362][ T4171] BPF:[1] FUNC_PROTO (anon) [ 2882.281580][ T4173] BPF:Invalid magic 09:58:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2882.306823][ T4171] BPF:return=0 args=( [ 2882.338063][ T4171] BPF:0 (invalid-name-offset) [ 2882.343435][ T4176] BPF:[1] DATASEC (anon) [ 2882.348010][ T4178] BPF:Invalid magic [ 2882.363749][ T4176] BPF:size=0 vlen=0 [ 2882.369814][ T4171] BPF:, 4 (invalid-name-offset) [ 2882.376317][ T4176] BPF: [ 2882.381507][ T4176] BPF:vlen == 0 09:58:02 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:02 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) sendmsg$rds(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/30, 0x1e}, {&(0x7f00000000c0)=""/58, 0x3a}, {&(0x7f0000000100)=""/220, 0xdc}], 0x3, 0x0, 0x0, 0x4}, 0xf69b04ce954886ab) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2, 0x0, 0xc}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2882.386580][ T4171] BPF:) [ 2882.401086][ T4176] BPF: [ 2882.401086][ T4176] [ 2882.416267][ T4171] BPF: [ 2882.460988][ T4171] BPF:Invalid arg#1 [ 2882.464895][ T4171] BPF: [ 2882.464895][ T4171] [ 2882.473047][ T4184] BPF:[1] DATASEC (anon) [ 2882.477488][ T4184] BPF:size=0 vlen=0 [ 2882.511006][ T4184] BPF: [ 2882.513926][ T4184] BPF:vlen == 0 [ 2882.528902][ T4187] BPF:Unsupported section found [ 2882.563402][ T4184] BPF: [ 2882.563402][ T4184] [ 2882.571302][ T4193] BPF:Unsupported section found [ 2882.669144][ T4197] BPF:[1] FUNC a [ 2882.708353][ T4197] BPF:type_id=0 [ 2882.729908][ T4197] BPF: [ 2882.757415][ T4197] BPF:vlen != 0 [ 2882.771640][ T4197] BPF: [ 2882.771640][ T4197] [ 2882.831838][ T4199] BPF:Invalid section offset 09:58:02 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") socketpair(0x5, 0xa, 0x5, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x7fff, @mcast1, 0x1}, 0x1c) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x3, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000100)=""/236, 0x2e, 0xec, 0x8}, 0x20) 09:58:02 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xa000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:02 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @empty}, {0x306}, 0x0, {0x2, 0x4e23, @multicast2}, 'gre0\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:58:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:02 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2882.894733][ T4202] BPF:Unsupported section found [ 2882.913892][ T4207] BPF:Unsupported section found [ 2882.921901][ T4206] BPF:[1] DATASEC (anon) [ 2882.926291][ T4206] BPF:size=0 vlen=0 [ 2882.934977][ T4209] BPF:[1] FUNC_PROTO (anon) [ 2882.939608][ T4209] BPF:return=0 args=( 09:58:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:02 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2882.968393][ T4206] BPF: [ 2882.979122][ T4206] BPF:vlen == 0 [ 2882.990639][ T4206] BPF: [ 2882.990639][ T4206] [ 2883.027916][ T4209] BPF:0 (invalid-name-offset) [ 2883.035312][ T4213] BPF:[1] DATASEC (anon) [ 2883.063855][ T4209] BPF:, 4 (invalid-name-offset) [ 2883.065343][ T4213] BPF:size=0 vlen=0 [ 2883.074756][ T4215] BPF:Unsupported section found [ 2883.090815][ T4209] BPF:) [ 2883.104068][ T4209] BPF: [ 2883.107104][ T4218] BPF:Unsupported section found [ 2883.110272][ T4213] BPF: [ 2883.119900][ T4209] BPF:Invalid arg#1 [ 2883.123154][ T4213] BPF:vlen == 0 [ 2883.131163][ T4209] BPF: [ 2883.131163][ T4209] 09:58:03 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x12, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2883.154580][ T4220] BPF:[1] FUNC_PROTO (anon) [ 2883.171543][ T4213] BPF: [ 2883.171543][ T4213] [ 2883.188411][ T4220] BPF:return=0 args=( [ 2883.218149][ T4220] BPF:0 (invalid-name-offset) [ 2883.218845][ T4224] BPF:[1] Invalid name_offset:3 [ 2883.243866][ T4220] BPF:, 4 (invalid-name-offset) 09:58:03 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x2, 0x2, 0x6) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000240)=0xe8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2883.269055][ T4220] BPF:) [ 2883.282087][ T4220] BPF: [ 2883.303547][ T4229] BPF:Unsupported section found [ 2883.307351][ T4220] BPF:Invalid arg#1 [ 2883.330223][ T4220] BPF: [ 2883.330223][ T4220] [ 2883.336437][ T4233] BPF:Unsupported section found [ 2883.369506][ T4197] BPF:[1] FUNC a [ 2883.388803][ T4197] BPF:type_id=0 [ 2883.408106][ T4197] BPF: [ 2883.419127][ T4197] BPF:vlen != 0 [ 2883.441014][ T4197] BPF: [ 2883.441014][ T4197] [ 2883.448801][ T4239] BPF:[1] DATASEC (anon) 09:58:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e23, 0x0, @local, 0x5}}}, &(0x7f0000000280)=0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000002c0)={r3, 0x3}, &(0x7f00000009c0)=0x8) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)}, {&(0x7f0000000300)=""/90, 0x5a}, {&(0x7f0000000380)=""/67, 0x43}, {&(0x7f0000000440)=""/163, 0xa3}, {&(0x7f0000000a00)=""/150, 0x96}, {&(0x7f00000005c0)=""/162, 0xa2}], 0x7, &(0x7f0000000800)=""/132, 0x84}, 0x10000) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r4, 0x3c3, 0xb0, &(0x7f0000000100)="875f3e68e4af51ef52b8c22b081bede7a5d4755d94a8dada907e5bdb0173cfb179a64b56abc7f85a22c23e2872055e8ea188b4ca19cd04e76dbbfd28ad5e5af50d8e9012d64d38352b68b622473de7c9fcca43c7d8b8025045a9b46d704cd8e5d20d4b18842a4c0ce9fa7f3beddab8c87231b189435366b6803dbb1070d3c398df0a6ac1805d4638fb955dfe2ac490f3aa4214d535e268a5404ba07e1c5d1140f05fb4b4560c0baf7272ff2197a2f3270c053b25fc36652120990f5151e6004df4cae9d93cfca7328ec73880ce64", 0xce) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r5, &(0x7f0000000080), 0x15d4b87) r6 = accept4$rose(r5, &(0x7f0000000e00)=@full={0xb, @dev, @rose, 0x0, [@rose, @null, @rose, @rose, @remote, @default]}, &(0x7f0000000e40)=0x40, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r6, 0xc080661a, &(0x7f0000000e80)={{0x6, 0x0, @identifier="5c3be546c8d3d920c1a979bd6a7dacb4"}}) ioctl$EXT4_IOC_SETFLAGS(r5, 0x6628, 0x0) r7 = openat$cgroup_ro(r5, &(0x7f0000000500)='cpuacct.usage_all\x00', 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r8, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r8, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r8, 0x6628, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000000d40)=[@in6={0xa, 0x4e20, 0x8, @remote, 0x5}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e23, 0x800, @ipv4={[], [], @multicast2}, 0xffffffff}, @in6={0xa, 0x4e22, 0x4000000, @dev={0xfe, 0x80, [], 0x28}, 0x2}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e22, @empty}], 0x94) getsockopt$inet6_mreq(r8, 0x29, 0x1b, &(0x7f0000000bc0)={@initdev, 0x0}, &(0x7f0000000c00)=0x14) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r10, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r10, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r10, 0x6628, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x4, 0xf, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7ca5, 0x0, 0x0, 0x0, 0x8}, @generic={0x0, 0x2, 0x2, 0x9, 0x1ff}, @call={0x85, 0x0, 0x0, 0x3b}, @map={0x18, 0x6, 0x1, 0x0, r7}, @ldst={0x1, 0x0, 0x0, 0x1, 0x6, 0x6, 0x10}, @ldst={0x6, 0x1, 0x2, 0x3, 0x5, 0x80, 0xfffffffffffffff0}, @alu={0x7, 0x1, 0x3, 0x0, 0x1, 0x30}]}, &(0x7f0000000ac0)='GPL\x00', 0x7, 0x87, &(0x7f0000000b00)=""/135, 0x40f00, 0x4, [], r9, 0x13, r10, 0x8, &(0x7f0000000c40)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000c80)={0x0, 0xd, 0x6b, 0x800}, 0x10}, 0x70) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018b7c0000000000001000000000000000000"], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 09:58:03 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1c000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:03 executing program 4 (fault-call:2 fault-nth:0): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2883.489198][ T4239] BPF:size=0 vlen=0 09:58:03 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xdb, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2883.514700][ T4239] BPF: [ 2883.522929][ T4239] BPF:vlen == 0 [ 2883.534526][ T4239] BPF: [ 2883.534526][ T4239] [ 2883.573860][ T4248] BPF:[1] FUNC_PROTO (anon) [ 2883.611107][ T4248] BPF:return=0 args=( [ 2883.614737][ T4252] BPF:Unsupported section found [ 2883.632261][ T4253] BPF:btf_header not found [ 2883.651901][ T4248] BPF:0 (invalid-name-offset) [ 2883.653053][ T4255] BPF:Unsupported section found 09:58:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2883.661814][ T4256] BPF:[1] DATASEC (anon) [ 2883.666263][ T4256] BPF:size=0 vlen=0 [ 2883.684372][ T4256] BPF: [ 2883.691148][ T4248] BPF:, 4 (invalid-name-offset) [ 2883.696124][ T4248] BPF:) [ 2883.697353][ T4256] BPF:vlen == 0 [ 2883.720243][ T4256] BPF: [ 2883.720243][ T4256] 09:58:03 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x334, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2883.741190][ T4248] BPF: [ 2883.744156][ T4248] BPF:Invalid arg#1 [ 2883.782737][ T4248] BPF: [ 2883.782737][ T4248] 09:58:03 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfffffffffffffcc5, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0xffffffffffffff2c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000080)={{0x7, 0x0, @descriptor="517a71f2c78235ef"}, 0xd7, [], "3dd8a4a3fd138e00919c3f330189f5d8665d728c87d8fa1df534e9f5c31a4dc140be8d50db349740f44ed903a474ecb53d9d1a4e74c883bdf19b37227d8cd7afd6088d7de24e67a7ef7664de2806d7bd2f1140249d2d1a10dee9304b7180216815ba4998f309742228de1a1a4ef9f2dd00bb44045acfd86362668b33c743c125c2fe63f9a781cae58e054765e9d6f3145d5b48a9dfde3e7c33546ddae18b2834d7156050b64b7cfddbccfe7475fffcb13b5bff77942e32f6e9ba4148e372827ecde229002809251a8df5d9e8190a91036de2b27b235acf"}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x6628, 0x0) socket(0x1, 0x3, 0xff) sendmsg$tipc(r2, &(0x7f0000000440)={&(0x7f00000001c0)=@name={0x1e, 0x2, 0x2, {{0x40, 0x1}, 0x2}}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000200)="af4c", 0x2}, {&(0x7f0000000240)="7ea9877f3738c5fff4ed2ea64c0f383d16c5650ba0100cbd60be29b04c12c3b31fc53d4df19b9e0609f1d411fc0821f064129a4d109573625e0d3d71a7467cda9a556c5d5aa20370576356da951c49aa37edef363a7651bf78b83d9fdc350e458ed78e3260368a1fe6eec9ec834e414cf12bbcff388c84cd2850b1adfb38befabfdca6bd249cab629e82d158", 0x8c}], 0x2, &(0x7f0000000340)="8149e2855c81f88b21785d8be28d27f55a0cecc78c181596a7ec1e4c743da47c17a2c55d447c5c18150d2bfe366b0186e77ff1f43fc8913d0275058a63b4c91630c2e7e4e029e9229462767fa760761c6a40c9a2050cc8b4aa079048ef4062d66a163d27d408c062606abce60c366020ddc44cee9163d99b6e16228302a0aa9dc111afca90cbd23ceecbb345aca013329442ebc7416187398076430848bbe95e897b3de7028f13662627b6c318f4f321575546580e6429d14ab3bbadd46e1787", 0xc0, 0x4008900}, 0x800) 09:58:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2883.807909][ T4263] BPF:[1] FUNC_PROTO (anon) [ 2883.822955][ T4263] BPF:return=0 args=( [ 2883.846151][ T4263] BPF:0 (invalid-name-offset) [ 2883.852458][ T4265] BPF:Unsupported section found [ 2883.905171][ T4263] BPF:, 4 (invalid-name-offset) [ 2883.921152][ T4263] BPF:) [ 2883.923971][ T4263] BPF: [ 2883.926750][ T4263] BPF:Invalid arg#1 [ 2883.930564][ T4263] BPF: [ 2883.930564][ T4263] [ 2883.935816][ T4270] BPF:Unsupported section found 09:58:03 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1200, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:03 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1e000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2883.989819][ T4274] FAULT_INJECTION: forcing a failure. [ 2883.989819][ T4274] name failslab, interval 1, probability 0, space 0, times 0 09:58:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2884.116516][ T4274] CPU: 1 PID: 4274 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 2884.124498][ T4274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2884.134657][ T4274] Call Trace: [ 2884.137976][ T4274] dump_stack+0x172/0x1f0 [ 2884.142339][ T4274] should_fail.cold+0xa/0x15 [ 2884.146957][ T4274] ? fault_create_debugfs_attr+0x180/0x180 [ 2884.152788][ T4274] ? ___might_sleep+0x163/0x2c0 [ 2884.157666][ T4274] __should_failslab+0x121/0x190 [ 2884.162625][ T4274] should_failslab+0x9/0x14 [ 2884.167144][ T4274] kmem_cache_alloc_trace+0x2d3/0x790 [ 2884.172567][ T4274] ? refcount_sub_and_test_checked+0x154/0x200 [ 2884.178762][ T4274] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2884.184158][ T4274] btf_new_fd+0x1c9/0x1d10 [ 2884.188592][ T4274] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2884.194589][ T4274] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2884.200845][ T4274] ? apparmor_capable+0x2ed/0x630 [ 2884.205906][ T4274] ? cap_capable+0x205/0x270 [ 2884.210515][ T4274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2884.216773][ T4274] ? btf_type_seq_show+0x1b0/0x1b0 [ 2884.221904][ T4274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2884.228159][ T4274] ? ns_capable_common+0x93/0x100 [ 2884.233204][ T4274] __do_sys_bpf+0x1328/0x3350 [ 2884.238080][ T4274] ? bpf_prog_load+0x16c0/0x16c0 [ 2884.243031][ T4274] ? __kasan_check_write+0x14/0x20 [ 2884.248343][ T4274] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2884.256691][ T4274] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2884.261996][ T4274] ? wait_for_completion+0x440/0x440 [ 2884.267315][ T4274] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2884.273747][ T4274] ? fput_many+0x12c/0x1a0 [ 2884.278194][ T4274] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2884.283792][ T4274] ? do_syscall_64+0x26/0x760 [ 2884.288496][ T4274] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2884.294591][ T4274] ? do_syscall_64+0x26/0x760 [ 2884.299388][ T4274] __x64_sys_bpf+0x73/0xb0 [ 2884.303831][ T4274] do_syscall_64+0xfa/0x760 [ 2884.308352][ T4274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2884.314255][ T4274] RIP: 0033:0x459f39 [ 2884.318161][ T4274] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2884.337772][ T4274] RSP: 002b:00007f7a4a238c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2884.346198][ T4274] RAX: ffffffffffffffda RBX: 00007f7a4a238c90 RCX: 0000000000459f39 [ 2884.354183][ T4274] RDX: 0000000000000020 RSI: 0000000020000400 RDI: 0000000000000012 [ 2884.362178][ T4274] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2884.370165][ T4274] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7a4a2396d4 [ 2884.378152][ T4274] R13: 00000000004c0368 R14: 00000000004d2738 R15: 0000000000000004 [ 2884.392623][ T4281] BPF:Unsupported section found [ 2884.409579][ T4253] BPF:btf_header not found [ 2884.418028][ T4288] BPF:Unsupported section found [ 2884.423730][ T4283] BPF:[1] FUNC_PROTO (anon) [ 2884.431935][ T4283] BPF:return=0 args=( [ 2884.453284][ T4283] BPF:0 (invalid-name-offset) [ 2884.460310][ T4283] BPF:, 4 (invalid-name-offset) 09:58:04 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) 09:58:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3403, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:04 executing program 4 (fault-call:2 fault-nth:1): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2884.499678][ T4283] BPF:) [ 2884.504958][ T4283] BPF: [ 2884.523084][ T4283] BPF:Invalid arg#1 [ 2884.537655][ T4291] BPF:Unsupported section found [ 2884.544365][ T4283] BPF: [ 2884.544365][ T4283] [ 2884.577997][ T4296] BPF:Unsupported section found [ 2884.584337][ T4297] BPF:[1] FUNC_PROTO (anon) [ 2884.594595][ T4297] BPF:return=0 args=( [ 2884.612441][ T4297] BPF:0 (invalid-name-offset) 09:58:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2884.624416][ T4297] BPF:, 4 (invalid-name-offset) 09:58:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2884.654347][ T4297] BPF:) [ 2884.661134][ T4299] FAULT_INJECTION: forcing a failure. [ 2884.661134][ T4299] name failslab, interval 1, probability 0, space 0, times 0 [ 2884.663930][ T4297] BPF: [ 2884.717531][ T4297] BPF:Invalid arg#1 [ 2884.728745][ T4299] CPU: 0 PID: 4299 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 2884.736597][ T4299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2884.746660][ T4299] Call Trace: [ 2884.749955][ T4299] dump_stack+0x172/0x1f0 [ 2884.754302][ T4299] should_fail.cold+0xa/0x15 [ 2884.758919][ T4299] ? fault_create_debugfs_attr+0x180/0x180 [ 2884.764339][ T4297] BPF: [ 2884.764339][ T4297] [ 2884.764743][ T4299] ? ___might_sleep+0x163/0x2c0 [ 2884.774430][ T4299] __should_failslab+0x121/0x190 [ 2884.779389][ T4299] should_failslab+0x9/0x14 [ 2884.783904][ T4299] kmem_cache_alloc_trace+0x2d3/0x790 [ 2884.789287][ T4299] ? refcount_sub_and_test_checked+0x154/0x200 [ 2884.795459][ T4299] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2884.800849][ T4299] btf_new_fd+0x424/0x1d10 [ 2884.805279][ T4299] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2884.811275][ T4299] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2884.817530][ T4299] ? apparmor_capable+0x2ed/0x630 [ 2884.822568][ T4299] ? cap_capable+0x205/0x270 [ 2884.827189][ T4299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2884.833799][ T4299] ? btf_type_seq_show+0x1b0/0x1b0 [ 2884.838937][ T4299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2884.845186][ T4299] ? ns_capable_common+0x93/0x100 [ 2884.850215][ T4299] __do_sys_bpf+0x1328/0x3350 [ 2884.854918][ T4299] ? bpf_prog_load+0x16c0/0x16c0 [ 2884.859878][ T4299] ? __kasan_check_write+0x14/0x20 [ 2884.865000][ T4299] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2884.870552][ T4299] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2884.875856][ T4299] ? wait_for_completion+0x440/0x440 [ 2884.881175][ T4299] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2884.887437][ T4299] ? fput_many+0x12c/0x1a0 [ 2884.891880][ T4299] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2884.897352][ T4299] ? do_syscall_64+0x26/0x760 [ 2884.902061][ T4299] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2884.909098][ T4299] ? do_syscall_64+0x26/0x760 [ 2884.913800][ T4299] __x64_sys_bpf+0x73/0xb0 [ 2884.918243][ T4299] do_syscall_64+0xfa/0x760 [ 2884.922767][ T4299] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2884.928666][ T4299] RIP: 0033:0x459f39 [ 2884.932567][ T4299] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2884.952180][ T4299] RSP: 002b:00007f7a4a238c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2884.960608][ T4299] RAX: ffffffffffffffda RBX: 00007f7a4a238c90 RCX: 0000000000459f39 09:58:04 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@nfc, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/73, 0x49}, {&(0x7f00000001c0)=""/233, 0xe9}, {&(0x7f00000002c0)=""/94, 0x5e}, {&(0x7f0000000340)=""/154, 0x9a}, {&(0x7f0000000440)=""/76, 0x4c}], 0x5, &(0x7f0000000000)=""/10, 0xa}, 0x10000) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@union={0x0, 0x0, 0x0, 0xf}]}, {0x0, [0x5f, 0x61, 0x0, 0x0, 0x2e, 0x2e, 0x61, 0x9d, 0x61]}}, &(0x7f0000000700)=""/220, 0x2f, 0xdc, 0x8}, 0x20) 09:58:04 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x20000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2884.968599][ T4299] RDX: 0000000000000020 RSI: 0000000020000400 RDI: 0000000000000012 [ 2884.976589][ T4299] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2884.985537][ T4299] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7a4a2396d4 [ 2884.993530][ T4299] R13: 00000000004c0368 R14: 00000000004d2738 R15: 0000000000000004 [ 2885.029691][ T4310] BPF:[1] ENUM (anon) [ 2885.046996][ T4311] BPF:[1] FUNC_PROTO (anon) [ 2885.047041][ T4310] BPF:size=4 vlen=1 [ 2885.065152][ T4311] BPF:return=0 args=( [ 2885.069186][ T4311] BPF:0 (invalid-name-offset) [ 2885.083304][ T4312] BPF:Unsupported section found [ 2885.099856][ T4311] BPF:, 4 (invalid-name-offset) [ 2885.103460][ T4310] BPF: [ 2885.105341][ T4317] BPF:Unsupported section found [ 2885.112784][ T4310] BPF:Invalid name [ 2885.121210][ T4311] BPF:) [ 2885.125381][ T4310] BPF: [ 2885.125381][ T4310] [ 2885.127403][ T4311] BPF: 09:58:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:05 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xdb00, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x6628, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f00000000c0)={{0x1, 0x0, @reserved="09aea0f4a6eba2d6c356b23d7a342e0151f7c7114fd9209fde3d2c5a70eccdd9"}}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000014000000140000000200"/34], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2885.161054][ T4311] BPF:Invalid arg#1 [ 2885.176590][ T4311] BPF: [ 2885.176590][ T4311] [ 2885.199130][ T4318] BPF:[1] FUNC_PROTO (anon) [ 2885.211091][ T4318] BPF:return=0 args=( [ 2885.229609][ T4318] BPF:0 (invalid-name-offset) [ 2885.241113][ T4318] BPF:, 4 (invalid-name-offset) 09:58:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2885.282560][ T4318] BPF:) [ 2885.300937][ T4318] BPF: [ 2885.303775][ T4318] BPF:Invalid arg#1 [ 2885.333812][ T4318] BPF: [ 2885.333812][ T4318] [ 2885.347649][ T4331] BPF:[1] DATASEC (anon) [ 2885.356282][ T4332] BPF:Unsupported section found [ 2885.369093][ T4331] BPF:size=0 vlen=0 [ 2885.378376][ T4337] BPF:Unsupported section found 09:58:05 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3f000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2885.388031][ T4331] BPF: [ 2885.389219][ T4336] BPF:[1] Invalid kind:0 09:58:05 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xfffff, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2885.435462][ T4331] BPF:vlen == 0 [ 2885.471002][ T4331] BPF: [ 2885.471002][ T4331] 09:58:05 executing program 4 (fault-call:2 fault-nth:2): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2885.528355][ T4342] BPF:Unsupported section found [ 2885.556493][ T4345] BPF:[1] FUNC_PROTO (anon) [ 2885.566091][ T4350] BPF:Unsupported section found [ 2885.581646][ T4345] BPF:return=0 args=( [ 2885.590395][ T4345] BPF:0 (invalid-name-offset) 09:58:05 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x400000, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2885.613344][ T4345] BPF:, 4 (invalid-name-offset) [ 2885.631167][ T4345] BPF:) [ 2885.637611][ T4345] BPF: [ 2885.640762][ T4345] BPF:Invalid arg#1 [ 2885.669415][ T4345] BPF: [ 2885.669415][ T4345] [ 2885.709232][ T4356] BPF:[1] FUNC_PROTO (anon) [ 2885.712900][ T4359] FAULT_INJECTION: forcing a failure. [ 2885.712900][ T4359] name failslab, interval 1, probability 0, space 0, times 0 [ 2885.728399][ T4356] BPF:return=0 args=( [ 2885.732843][ T4358] BPF:Unsupported section found [ 2885.744772][ T4356] BPF:0 (invalid-name-offset) [ 2885.757704][ T4360] BPF:Unsupported section found [ 2885.773832][ T4359] CPU: 1 PID: 4359 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 2885.781682][ T4359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2885.783070][ T4356] BPF:, 4 (invalid-name-offset) [ 2885.791747][ T4359] Call Trace: [ 2885.791775][ T4359] dump_stack+0x172/0x1f0 [ 2885.791798][ T4359] should_fail.cold+0xa/0x15 [ 2885.791816][ T4359] ? fault_create_debugfs_attr+0x180/0x180 [ 2885.791833][ T4359] ? ___might_sleep+0x163/0x2c0 [ 2885.791854][ T4359] __should_failslab+0x121/0x190 [ 2885.791879][ T4359] should_failslab+0x9/0x14 [ 2885.818894][ T4356] BPF:) [ 2885.819568][ T4359] kmem_cache_alloc_node_trace+0x274/0x750 [ 2885.819585][ T4359] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2885.819605][ T4359] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2885.833629][ T4356] BPF: [ 2885.837583][ T4359] __kmalloc_node+0x3d/0x70 [ 2885.837606][ T4359] kvmalloc_node+0x68/0x100 [ 2885.858086][ T4356] BPF:Invalid arg#1 [ 2885.861110][ T4359] btf_new_fd+0x468/0x1d10 [ 2885.861128][ T4359] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2885.861142][ T4359] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2885.861162][ T4359] ? apparmor_capable+0x2ed/0x630 [ 2885.869463][ T4356] BPF: [ 2885.869463][ T4356] [ 2885.875343][ T4359] ? cap_capable+0x205/0x270 [ 2885.875361][ T4359] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2885.875378][ T4359] ? btf_type_seq_show+0x1b0/0x1b0 [ 2885.875398][ T4359] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2885.913744][ T4359] ? ns_capable_common+0x93/0x100 [ 2885.918795][ T4359] __do_sys_bpf+0x1328/0x3350 [ 2885.923582][ T4359] ? bpf_prog_load+0x16c0/0x16c0 [ 2885.928543][ T4359] ? __kasan_check_write+0x14/0x20 [ 2885.933674][ T4359] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2885.939236][ T4359] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2885.944538][ T4359] ? wait_for_completion+0x440/0x440 [ 2885.949848][ T4359] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2885.956100][ T4359] ? fput_many+0x12c/0x1a0 [ 2885.960544][ T4359] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2885.966030][ T4359] ? do_syscall_64+0x26/0x760 [ 2885.970730][ T4359] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2885.976815][ T4359] ? do_syscall_64+0x26/0x760 [ 2885.981507][ T4359] __x64_sys_bpf+0x73/0xb0 [ 2885.985926][ T4359] do_syscall_64+0xfa/0x760 [ 2885.990539][ T4359] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2885.996416][ T4359] RIP: 0033:0x459f39 [ 2886.000426][ T4359] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2886.020021][ T4359] RSP: 002b:00007f7a4a1f6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2886.028419][ T4359] RAX: ffffffffffffffda RBX: 00007f7a4a1f6c90 RCX: 0000000000459f39 [ 2886.036387][ T4359] RDX: 0000000000000020 RSI: 0000000020000400 RDI: 0000000000000012 [ 2886.044349][ T4359] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 2886.052313][ T4359] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7a4a1f76d4 [ 2886.060267][ T4359] R13: 00000000004c0368 R14: 00000000004d2738 R15: 0000000000000003 09:58:06 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x80ffff, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:06 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:06 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x40000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:06 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000480)={r4}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=r4, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0xfffffffffffffea8}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x38a) 09:58:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x4, @rand_addr="6a8135cb66d893ebc9db03d739b2de66"}, 0x1c) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002000000000000000100000f0000000006c97ff1ecb90000000400000003"], &(0x7f0000000700)=""/220, 0x32, 0xdc, 0x8}, 0x20) 09:58:06 executing program 4 (fault-call:2 fault-nth:3): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2886.204457][ T4367] BPF:Unsupported section found [ 2886.209835][ T4370] BPF:[1] FUNC_PROTO (anon) [ 2886.224525][ T4374] BPF:Unsupported section found [ 2886.269652][ T4370] BPF:return=0 args=( [ 2886.288702][ T4370] BPF:0 (invalid-name-offset) 09:58:06 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:06 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2886.326412][ T4378] BPF:[1] INT (anon) [ 2886.331047][ T4370] BPF:, 4 (invalid-name-offset) [ 2886.337020][ T4370] BPF:) [ 2886.339921][ T4370] BPF: [ 2886.374408][ T4379] BPF:Invalid string section [ 2886.391065][ T4370] BPF:Invalid arg#1 [ 2886.395020][ T4370] BPF: [ 2886.395020][ T4370] [ 2886.405464][ T4378] BPF:size=0 bits_offset=9 nr_bits=0 encoding=(none) [ 2886.414315][ T4382] BPF:[1] FUNC_PROTO (anon) [ 2886.419333][ T4382] BPF:return=0 args=( [ 2886.423594][ T4378] BPF: [ 2886.426964][ T4378] BPF:nr_bits exceeds type_size [ 2886.440465][ T4382] BPF:0 (invalid-name-offset) [ 2886.447917][ T4378] BPF: [ 2886.447917][ T4378] [ 2886.458871][ T4386] BPF:Unsupported section found [ 2886.464058][ T4382] BPF:, 4 (invalid-name-offset) [ 2886.488826][ T4382] BPF:) [ 2886.494316][ T4388] BPF:Unsupported section found [ 2886.507822][ T4382] BPF: [ 2886.511115][ T4382] BPF:Invalid arg#1 [ 2886.521459][ T4382] BPF: [ 2886.521459][ T4382] 09:58:06 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x2e, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:06 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:06 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x48000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2886.670275][ T4396] BPF:[1] INT (anon) [ 2886.713870][ T4396] BPF:size=0 bits_offset=9 nr_bits=0 encoding=(none) [ 2886.725982][ T4401] BPF:Unsupported section found [ 2886.741727][ T4402] BPF:Unsupported section found 09:58:06 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x34, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:06 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2886.768306][ T4396] BPF: [ 2886.788558][ T4396] BPF:nr_bits exceeds type_size [ 2886.806998][ T4396] BPF: [ 2886.806998][ T4396] [ 2886.848740][ T4406] BPF:[1] FUNC_PROTO (anon) [ 2886.876467][ T4406] BPF:return=0 args=( [ 2886.902206][ T4406] BPF:0 (invalid-name-offset) 09:58:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2886.925563][ T4410] BPF:Unsupported section found [ 2886.936188][ T4406] BPF:, 4 (invalid-name-offset) [ 2886.947740][ T4406] BPF:) [ 2886.950694][ T4406] BPF: [ 2886.958203][ T4413] BPF:Unsupported section found [ 2886.968401][ T4406] BPF:Invalid arg#1 [ 2887.004450][ T4406] BPF: [ 2887.004450][ T4406] [ 2887.040320][ T4418] BPF:[1] FUNC_PROTO (anon) [ 2887.043557][ T4379] BPF:Invalid string section [ 2887.062481][ T4418] BPF:return=0 args=( [ 2887.066517][ T4418] BPF:0 (invalid-name-offset) [ 2887.120464][ T4418] BPF:, 4 (invalid-name-offset) [ 2887.141189][ T4418] BPF:) [ 2887.157494][ T4418] BPF: [ 2887.160312][ T4418] BPF:Invalid arg#1 [ 2887.181110][ T4418] BPF: [ 2887.181110][ T4418] 09:58:07 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) 09:58:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x36, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:07 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:07 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.threads\x00', 0x2, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000440)=""/171, 0xab}], 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)=""/220, 0x158, 0xdc, 0x8}, 0x20) 09:58:07 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4c000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2887.353982][ T4395] sctp: [Deprecated]: syz-executor.0 (pid 4395) Use of int in maxseg socket option. [ 2887.353982][ T4395] Use struct sctp_assoc_value instead [ 2887.425913][ T4433] BPF:Unsupported section found [ 2887.431604][ T4431] BPF:[1] FUNC_PROTO (anon) [ 2887.436495][ T4431] BPF:return=0 args=( [ 2887.436537][ T4434] BPF:Invalid magic [ 2887.450612][ T4431] BPF:0 (invalid-name-offset) [ 2887.455717][ T4438] BPF:Unsupported section found [ 2887.458553][ T4439] BPF:Invalid magic 09:58:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x3fe, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:07 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001d000000000000000c0000000c00cfab94f02658707a79f9ea000002000000000000000006000f000000000000"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2887.479442][ T4431] BPF:, 4 (invalid-name-offset) [ 2887.491080][ T4431] BPF:) [ 2887.494056][ T4431] BPF: [ 2887.504328][ T4431] BPF:Invalid arg#1 [ 2887.518395][ T4431] BPF: [ 2887.518395][ T4431] [ 2887.559950][ T4442] BPF:[1] FUNC_PROTO (anon) 09:58:07 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2887.581085][ T4442] BPF:return=0 args=( [ 2887.600174][ T4442] BPF:0 (invalid-name-offset) [ 2887.630127][ T4442] BPF:, 4 (invalid-name-offset) [ 2887.646033][ T4442] BPF:) 09:58:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2887.670671][ T4451] BPF:Unsupported btf_header [ 2887.681390][ T4442] BPF: [ 2887.699833][ T4454] BPF:Unsupported section found [ 2887.704882][ T4442] BPF:Invalid arg#1 09:58:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x7ffff, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2887.731637][ T4457] BPF:[1] ENUM (anon) [ 2887.739677][ T4457] BPF:size=4 vlen=1 [ 2887.744087][ T4442] BPF: [ 2887.744087][ T4442] [ 2887.751815][ T4459] BPF:Unsupported btf_header [ 2887.761659][ T4460] BPF:Unsupported section found [ 2887.769300][ T4457] BPF: [ 2887.779419][ T4457] BPF:Invalid name [ 2887.819149][ T4457] BPF: [ 2887.819149][ T4457] [ 2887.879421][ T4470] BPF:[1] ENUM (anon) [ 2887.926368][ T4470] BPF:size=4 vlen=1 [ 2887.957636][ T4470] BPF: [ 2887.960457][ T4470] BPF:Invalid name [ 2887.969423][ T4470] BPF: [ 2887.969423][ T4470] 09:58:07 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:07 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x60000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:07 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb1fbeef4f7ac7307e00000c0000000c00000002000000000000000000000f000000000000"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:58:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:07 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000000), &(0x7f00000000c0)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001400000014000000020000000000010000060400"/44], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000100), &(0x7f0000000180)=0x40) [ 2888.058317][ T4478] BPF:btf_header not found [ 2888.064784][ T4476] BPF:[1] FUNC_PROTO (anon) [ 2888.101403][ T4476] BPF:return=0 args=( [ 2888.105707][ T4484] BPF:btf_header not found [ 2888.111014][ T4480] BPF:Unsupported section found [ 2888.124228][ T4486] BPF:Unsupported version [ 2888.128795][ T4476] BPF:0 (invalid-name-offset) 09:58:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2888.170261][ T4489] BPF:Unsupported section found [ 2888.175639][ T4476] BPF:, 4 (invalid-name-offset) [ 2888.184377][ T4490] BPF:Unsupported version [ 2888.190154][ T4476] BPF:) [ 2888.198197][ T4476] BPF: [ 2888.207636][ T4476] BPF:Invalid arg#1 09:58:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2888.222994][ T4491] BPF:[1] Invalid btf_info:40600 [ 2888.231066][ T4476] BPF: [ 2888.231066][ T4476] 09:58:08 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000f000000000000"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:58:08 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x12000000, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2888.274446][ T4493] BPF:[1] FUNC_PROTO (anon) [ 2888.325166][ T4493] BPF:return=0 args=( [ 2888.361163][ T4493] BPF:0 (invalid-name-offset) 09:58:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2888.411146][ T4493] BPF:, 4 (invalid-name-offset) [ 2888.427798][ T4501] BPF:Unsupported version [ 2888.432616][ T4493] BPF:) [ 2888.454737][ T4493] BPF: [ 2888.462460][ T4505] BPF:[1] Invalid btf_info:f0000 [ 2888.469206][ T4493] BPF:Invalid arg#1 [ 2888.472316][ T4504] BPF:Unsupported section found [ 2888.479880][ T4506] BPF:Unsupported version [ 2888.508389][ T4508] BPF:Unsupported section found [ 2888.520251][ T4493] BPF: [ 2888.520251][ T4493] [ 2888.526715][ T4509] BPF:[1] Invalid btf_info:f0000 09:58:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1d, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2888.721686][ T4516] BPF:Unsupported version [ 2888.727950][ T4517] BPF:Unsupported version 09:58:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x6628, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000000c0)={0x8000, {{0x2, 0x4e24, @remote}}}, 0x88) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x16e, [@enum={0x9, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xffffffffffffff5b, 0xc}, 0x20) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000000)={0x100000001, 0x2, 0x1}) 09:58:08 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x68000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:08 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x34030000, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) sendfile(r1, r2, &(0x7f0000000000), 0xffe) preadv(r1, &(0x7f0000001480)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000180)=""/50, 0x32}, {&(0x7f00000001c0)=""/227, 0xe3}, {&(0x7f00000002c0)=""/144, 0x90}, {&(0x7f0000000380)=""/110, 0x6e}, {&(0x7f0000001440)=""/55, 0x37}], 0x6, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl(r0, 0xa5, &(0x7f0000001500)="080051484e61b62063c965fbd04abe7a0325e252e266ac3b5817ff1af54fd2cc17fb1241dd95acf3fe5eb3fc538e1452653c397391ac89775aea9e24732aabb240e3e7952c45a9c37fd2933500e00a497e7fbd38debe1350b49ce6af28f8332a95aeee1fff4fb83d06b0ea6b6d854aa01d66ada5c03e058228143433f5714288802549400d08cddb5d2e9141bbf4cb48f7d70d696340ff91917200fc3f0322733d312f57f0aa98e8ab56593549") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf, 0x0, 0x4}]}}, &(0x7f0000000080)=""/225, 0x26, 0xe1, 0x8}, 0x20) 09:58:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x25, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2888.948455][ T4491] BPF:[1] Invalid btf_info:40600 [ 2889.003769][ T4529] BPF:Unsupported section found [ 2889.009456][ T4530] BPF:[1] FUNC_PROTO (anon) [ 2889.017196][ T4532] BPF:Unsupported version [ 2889.023102][ T4530] BPF:return=0 args=( [ 2889.024158][ T4531] BPF:[1] DATASEC (anon) [ 2889.031724][ T4534] BPF:Unsupported section found [ 2889.036345][ T4530] BPF:0 (invalid-name-offset) [ 2889.042532][ T4535] BPF:Unsupported version [ 2889.049252][ T4530] BPF:, 4 (invalid-name-offset) 09:58:09 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x2e, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2889.056982][ T4531] BPF:size=4 vlen=0 [ 2889.061341][ T4530] BPF:) [ 2889.067634][ T4530] BPF: [ 2889.067723][ T4531] BPF: [ 2889.074992][ T4530] BPF:Invalid arg#1 [ 2889.084731][ T4530] BPF: [ 2889.084731][ T4530] [ 2889.087321][ T4531] BPF:vlen == 0 [ 2889.102087][ T4536] BPF:[1] FUNC_PROTO (anon) [ 2889.121761][ T4536] BPF:return=0 args=( 09:58:09 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x40000000, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2889.142862][ T4531] BPF: [ 2889.142862][ T4531] [ 2889.146216][ T4536] BPF:0 (invalid-name-offset) [ 2889.189539][ T4536] BPF:, 4 (invalid-name-offset) [ 2889.196553][ T4540] BPF:[1] DATASEC (anon) [ 2889.206753][ T4544] BPF:Unsupported version [ 2889.236362][ T4540] BPF:size=4 vlen=0 [ 2889.240314][ T4536] BPF:) [ 2889.248087][ T4540] BPF: [ 2889.251395][ T4536] BPF: [ 2889.254286][ T4536] BPF:Invalid arg#1 [ 2889.259328][ T4540] BPF:vlen == 0 [ 2889.264255][ T4548] BPF:Unsupported version [ 2889.267061][ T4536] BPF: [ 2889.267061][ T4536] [ 2889.274616][ T4540] BPF: [ 2889.274616][ T4540] [ 2889.280619][ T4546] BPF:Unsupported section found 09:58:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x34, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2889.297181][ T4550] BPF:Unsupported section found 09:58:09 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r2 = accept$inet(r1, &(0x7f0000000640)={0x2, 0x0, @dev}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000006c0)={0x0, 0x7, 0x1000, 0xd0}, 0x10) 09:58:09 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x6c000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2889.456060][ T4557] BPF:Unsupported version [ 2889.509128][ T4564] BPF:Unsupported version [ 2889.514468][ T4559] BPF:[1] DATASEC (anon) [ 2889.517913][ T4565] BPF:[1] FUNC_PROTO (anon) [ 2889.518837][ T4559] BPF:size=0 vlen=0 [ 2889.518843][ T4559] BPF: [ 2889.518851][ T4559] BPF:vlen == 0 [ 2889.518857][ T4559] BPF: [ 2889.518857][ T4559] [ 2889.557581][ T4567] BPF:[1] DATASEC (anon) [ 2889.561445][ T4565] BPF:return=0 args=( [ 2889.566104][ T4565] BPF:0 (invalid-name-offset) [ 2889.576892][ T4567] BPF:size=0 vlen=0 [ 2889.577423][ T4565] BPF:, 4 (invalid-name-offset) [ 2889.580761][ T4567] BPF: [ 2889.580768][ T4567] BPF:vlen == 0 [ 2889.580773][ T4567] BPF: [ 2889.580773][ T4567] [ 2889.631188][ T4565] BPF:) [ 2889.636029][ T4565] BPF: [ 2889.638981][ T4565] BPF:Invalid arg#1 [ 2889.650370][ T4565] BPF: [ 2889.650370][ T4565] [ 2889.673217][ T4569] BPF:[1] FUNC_PROTO (anon) [ 2889.679039][ T4569] BPF:return=0 args=( [ 2889.693473][ T4569] BPF:0 (invalid-name-offset) [ 2889.698323][ T4569] BPF:, 4 (invalid-name-offset) [ 2889.708722][ T4569] BPF:) [ 2889.712883][ T4569] BPF: [ 2889.715744][ T4569] BPF:Invalid arg#1 [ 2889.720198][ T4569] BPF: [ 2889.720198][ T4569] 09:58:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = accept4$llc(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) getsockname$llc(r1, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000100)=0x10) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) 09:58:09 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:09 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xdb000000, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x36, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:09 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000e90b00000002000000000000000000000f000000000000"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:58:09 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x74000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2889.946479][ T4573] BPF:Invalid section offset [ 2889.947582][ T4579] BPF:Unsupported version [ 2889.960207][ T4577] BPF:Total section length too long [ 2889.962122][ T4581] BPF:[1] FUNC_PROTO (anon) [ 2889.971273][ T4582] BPF:Unsupported version [ 2889.975777][ T4581] BPF:return=0 args=( [ 2889.982486][ T4581] BPF:0 (invalid-name-offset) [ 2889.987773][ T4583] BPF:Invalid section offset 09:58:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:10 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe4ffffff, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2889.993974][ T4585] BPF:Total section length too long [ 2890.001150][ T4581] BPF:, 4 (invalid-name-offset) [ 2890.012861][ T4581] BPF:) [ 2890.020257][ T4581] BPF: [ 2890.027923][ T4581] BPF:Invalid arg#1 [ 2890.037050][ T4581] BPF: [ 2890.037050][ T4581] [ 2890.070648][ T4587] BPF:[1] FUNC_PROTO (anon) 09:58:10 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000080)={0x6}, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb21001802000000000000000000000f00"/38], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2890.101478][ T4587] BPF:return=0 args=( [ 2890.137907][ T4587] BPF:0 (invalid-name-offset) [ 2890.153262][ T4587] BPF:, 4 (invalid-name-offset) 09:58:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2890.205887][ T4587] BPF:) [ 2890.209522][ T4597] BPF:[1] DATASEC (anon) [ 2890.216052][ T4596] BPF:Invalid section offset [ 2890.220802][ T4587] BPF: [ 2890.228187][ T4599] BPF:btf_header not found [ 2890.228563][ T4587] BPF:Invalid arg#1 [ 2890.244094][ T4601] BPF:Invalid section offset [ 2890.251283][ T4597] BPF: [ 2890.254087][ T4597] BPF:meta_left:0 meta_needed:24 [ 2890.259027][ T4597] BPF: [ 2890.259027][ T4597] [ 2890.268298][ T4587] BPF: [ 2890.268298][ T4587] 09:58:10 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7a000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2890.311248][ T4604] BPF:[1] DATASEC (anon) [ 2890.371640][ T4604] BPF: [ 2890.374539][ T4604] BPF:meta_left:0 meta_needed:24 [ 2890.408237][ T4604] BPF: [ 2890.408237][ T4604] [ 2890.416182][ T4611] BPF:[1] FUNC_PROTO (anon) [ 2890.434660][ T4611] BPF:return=0 args=( [ 2890.445849][ T4611] BPF:0 (invalid-name-offset) [ 2890.453509][ T4613] BPF:[1] ENUM (anon) [ 2890.472178][ T4611] BPF:, 4 (invalid-name-offset) [ 2890.477095][ T4611] BPF:) [ 2890.479854][ T4611] BPF: [ 2890.483238][ T4613] BPF:size=4 vlen=1 [ 2890.487444][ T4613] BPF: [ 2890.490378][ T4613] BPF:Invalid name [ 2890.500280][ T4613] BPF: [ 2890.500280][ T4613] [ 2890.502197][ T4611] BPF:Invalid arg#1 [ 2890.517800][ T4611] BPF: [ 2890.517800][ T4611] [ 2890.529853][ T4616] BPF:[1] ENUM (anon) [ 2890.534887][ T4616] BPF:size=4 vlen=1 [ 2890.542583][ T4616] BPF: [ 2890.551561][ T4616] BPF:Invalid name [ 2890.561341][ T4616] BPF: [ 2890.561341][ T4616] [ 2890.565156][ T4618] BPF:[1] FUNC_PROTO (anon) 09:58:10 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) r1 = socket$inet6_sctp(0xa, 0x5d34a7f08f10a3bc, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000000c0)=0x10001, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000000)) 09:58:10 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r2, r3, &(0x7f0000000000), 0xffe) poll(&(0x7f0000000080)=[{0xffffffffffffffff, 0x10}, {r2, 0x2}], 0x2, 0x22e) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:58:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:10 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff0f00, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2890.588117][ T4618] BPF:return=0 args=( [ 2890.612971][ T4618] BPF:0 (invalid-name-offset) [ 2890.627109][ T4618] BPF:, 4 (invalid-name-offset) [ 2890.630769][ T4625] BPF:Unsupported flags [ 2890.635557][ T4627] BPF:Invalid section offset [ 2890.644982][ T4618] BPF:) [ 2890.647871][ T4618] BPF: [ 2890.661931][ T4630] BPF:Invalid section offset [ 2890.666781][ T4631] BPF:Unsupported flags [ 2890.671390][ T4618] BPF:Invalid arg#1 [ 2890.679713][ T4618] BPF: [ 2890.679713][ T4618] [ 2890.687708][ T4633] BPF:[1] DATASEC (anon) [ 2890.695737][ T4633] BPF:size=0 vlen=0 09:58:10 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff8000, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2890.712009][ T4634] BPF:[1] ENUM (anon) [ 2890.716250][ T4633] BPF: [ 2890.719134][ T4634] BPF:size=4 vlen=1 [ 2890.723405][ T4633] BPF:vlen == 0 [ 2890.726993][ T4634] BPF: [ 2890.729866][ T4633] BPF: [ 2890.729866][ T4633] [ 2890.734934][ T4634] BPF:Invalid name [ 2890.738869][ T4634] BPF: [ 2890.738869][ T4634] 09:58:10 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xda000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2890.763629][ T4635] BPF:[1] ENUM (anon) [ 2890.805207][ T4635] BPF:size=4 vlen=1 [ 2890.824691][ T4639] BPF:Invalid section offset [ 2890.837870][ T4635] BPF: [ 2890.849994][ T4642] BPF:[1] FUNC_PROTO (anon) [ 2890.857177][ T4635] BPF:Invalid name [ 2890.882827][ T4646] BPF:Invalid section offset [ 2890.886750][ T4642] BPF:return=0 args=( [ 2890.892350][ T4635] BPF: [ 2890.892350][ T4635] [ 2890.902976][ T4642] BPF:0 (invalid-name-offset) [ 2890.908745][ T4642] BPF:, 4 (invalid-name-offset) [ 2890.917095][ T4649] BPF:Unsupported flags [ 2890.917961][ T4642] BPF:) [ 2890.926767][ T4642] BPF: 09:58:10 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb030018200000000000001400000014000000020000000000000001000006040200000000000000001000000008775cfd49caf084c12eb903bfeb9cf83ffb1eedd6cfcee73139cacdf623cb66f3565b2f770a6b5f5ee4fd0ef98d83e0e6c9947c6f6b930768f79ad20c63bff7f0"], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) epoll_create(0x1efa) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'ip6erspan0\x00', {0x2, 0x4e20, @empty}}) bind$nfc_llcp(r1, &(0x7f00000000c0)={0x27, 0x0, 0x0, 0x3, 0x4, 0x3f, "e0d9c0336dacb19581863368ae7702955e3ce30d09546725b30c11ca07cacb9ecb0bcf60014d777320042791b70069405ed57d864bf43b58a619802a2b9e3c", 0x27}, 0xfffffffffffffdcb) [ 2890.934901][ T4650] BPF:Unsupported flags [ 2890.940720][ T4642] BPF:Invalid arg#1 [ 2890.947761][ T4642] BPF: [ 2890.947761][ T4642] [ 2890.965807][ T4652] BPF:[1] FUNC_PROTO (anon) [ 2890.978399][ T4652] BPF:return=0 args=( 09:58:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2890.987366][ T4652] BPF:0 (invalid-name-offset) [ 2891.000018][ T4652] BPF:, 4 (invalid-name-offset) [ 2891.016155][ T4652] BPF:) [ 2891.025887][ T4652] BPF: 09:58:10 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff00, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2891.036278][ T4652] BPF:Invalid arg#1 [ 2891.056620][ T4652] BPF: [ 2891.056620][ T4652] 09:58:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2891.128139][ T4658] BPF:Invalid section offset [ 2891.135758][ T4660] BPF:Unsupported flags [ 2891.157882][ T4664] BPF:Invalid section offset [ 2891.164624][ T4663] BPF:Unsupported flags [ 2891.170423][ T4661] BPF:btf_header not found [ 2891.204400][ T4665] BPF:btf_header not found [ 2891.247564][ T4633] BPF:[1] DATASEC (anon) [ 2891.252191][ T4633] BPF:size=0 vlen=0 [ 2891.261328][ T4633] BPF: [ 2891.264176][ T4633] BPF:vlen == 0 [ 2891.267655][ T4633] BPF: [ 2891.267655][ T4633] 09:58:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:11 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xffff0f00}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:11 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffffe4, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb000000000000000c0000000c00000002000000000000000000000f0000000000003ddd3560cfdb9b2c5e340746977383d9b7404557000000"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:58:11 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000002c0), 0xfefe) sendfile(r3, r4, &(0x7f0000000000), 0xffe) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r6 = accept$alg(r5, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r9 = accept$alg(r8, 0x0, 0x0) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r11 = accept$alg(r10, 0x0, 0x0) r12 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r12, &(0x7f00000002c0), 0xfefe) sendfile(r11, r12, &(0x7f0000000000), 0xffe) r13 = socket$alg(0x26, 0x5, 0x0) bind$alg(r13, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) accept$alg(r13, 0x0, 0x0) r14 = socket$alg(0x26, 0x5, 0x0) bind$alg(r14, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) accept$alg(r14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000000d40)=ANY=[@ANYRES32, @ANYPTR=&(0x7f0000000b40)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="f38512ee4605390d161e89f6bb9632be73e161dba79fa474181ead10799d18d56d68193b57408c447abf55c2d559b2d7c32bd8eaf19f1302ed104ccc73fa29bcc22f78c5a79c75251c2a0604aa9e3895c50f55f9155a5a37de77a41de5a37792df51ccf1db052865f8b22e573100aa2f2372209e4bd47825cd1f552b072b780b9771453d1e08edc51ba4c4ecb6dbd1fc469a4b48a39db703b36d977a32646d5d37ac", @ANYPTR], @ANYRESOCT, @ANYPTR64=&(0x7f0000000c00)=ANY=[@ANYRESDEC=r9, @ANYRES16=r14], @ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRES32=r0, @ANYRESOCT, @ANYRES32=0x0, @ANYRES64, @ANYBLOB="b48a24b7f2f8f119e4ff0fc815785bfd65c4d6c452e8cfe1e3dd611095e93d32e1acd968076e7c0be93f9930b09ad4b6b72242c89571a49ca0f60f9be78a723e3135e825ae4c837fe29ad0652835ddb2a5b5d85e230b915fde2b863d64e7234dde19a9a3a0fae430cd3a3014442ce45dbd2537464ccfe1ed91086596423f4444c609f26a47f9dd28e9cdf6d6d5709887474a56f638", @ANYPTR, @ANYRES32, @ANYRES64], @ANYRES64], @ANYPTR64, @ANYPTR=&(0x7f0000000800)=ANY=[@ANYPTR=&(0x7f0000000640)=ANY=[@ANYPTR64, @ANYPTR=&(0x7f0000000a40)=ANY=[@ANYRESDEC=r13], @ANYRES32, @ANYRES64=r1, @ANYPTR, @ANYPTR64], @ANYBLOB="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", @ANYBLOB="b71dd411ef6128b863417c076a7d45ab6ef57758d1e85e30ccbe810e6fe9b1153e2fb091b6c94cfd4a44a6ad7ba520916816af191bb757e3a8a8727fa076038f5d50d537a51b67", @ANYRES16=r5, @ANYRES64, @ANYRESHEX=r6, @ANYRESDEC=r7, @ANYRESHEX=r0, @ANYRESDEC], @ANYRESHEX=0x0, @ANYPTR64=&(0x7f0000000500)=ANY=[], @ANYRESOCT=r6, @ANYRES32, @ANYRES32=r4, @ANYPTR=&(0x7f0000000ac0)=ANY=[@ANYRESHEX=r3, @ANYRESOCT=r8, @ANYPTR=&(0x7f0000000a80)=ANY=[@ANYRES64=0x0], @ANYRESHEX], @ANYRESHEX], &(0x7f00000000c0)=""/232, 0x6b, 0xe8, 0x1}, 0x20) [ 2891.433237][ T4677] BPF:[1] FUNC_PROTO (anon) [ 2891.460254][ T4683] BPF:Invalid section offset [ 2891.469935][ T4677] BPF:return=0 args=( [ 2891.471589][ T4679] BPF:Unsupported flags [ 2891.484452][ T4677] BPF:0 (invalid-name-offset) [ 2891.488083][ T4688] BPF:Unsupported flags [ 2891.493973][ T4677] BPF:, 4 (invalid-name-offset) [ 2891.499825][ T4689] BPF:Invalid section offset 09:58:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2891.511246][ T4687] BPF:Invalid magic [ 2891.520468][ T4677] BPF:) [ 2891.543233][ T4677] BPF: [ 2891.555585][ T4677] BPF:Invalid arg#1 09:58:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:11 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0x2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0)=0x2, 0x4) write$cgroup_int(r3, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r3, 0x6628, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000580)={r2, r3}) 09:58:11 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2891.562910][ T4677] BPF: [ 2891.562910][ T4677] [ 2891.582953][ T4693] BPF:Invalid magic [ 2891.585246][ T4694] BPF:[1] FUNC_PROTO (anon) [ 2891.659401][ T4694] BPF:return=0 args=( [ 2891.671193][ T4694] BPF:0 (invalid-name-offset) [ 2891.676177][ T4694] BPF:, 4 (invalid-name-offset) 09:58:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x2, &(0x7f0000000080)="06000000000000000000103a349ee13a581748cf73f02c237974bf1e1565a267072206edbe07fa890dfb55ef0749be357dde3e657d35d51a25ee400af1e20bcc7c82") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2891.712499][ T4694] BPF:) [ 2891.715382][ T4694] BPF: [ 2891.720061][ T4703] BPF:[1] ENUM (anon) [ 2891.738611][ T4694] BPF:Invalid arg#1 [ 2891.743217][ T4703] BPF:size=4 vlen=1 [ 2891.747125][ T4703] BPF: [ 2891.749608][ T4705] BPF:Unsupported section found [ 2891.754951][ T4694] BPF: [ 2891.754951][ T4694] 09:58:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2891.765572][ T4703] BPF:Invalid name [ 2891.771461][ T4706] BPF:Unsupported flags [ 2891.792369][ T4703] BPF: [ 2891.792369][ T4703] [ 2891.795986][ T4710] BPF:Unsupported section found [ 2891.799871][ T4708] BPF:Unsupported flags 09:58:11 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xffffff00}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2891.829172][ T4715] BPF:[1] DATASEC (anon) [ 2891.858245][ T4707] BPF:[1] ENUM (anon) 09:58:11 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2891.881218][ T4715] BPF:size=0 vlen=0 [ 2891.886119][ T4707] BPF:size=4 vlen=1 [ 2891.893507][ T4715] BPF: [ 2891.911322][ T4707] BPF: [ 2891.922069][ T4715] BPF:vlen == 0 [ 2891.931762][ T4707] BPF:Invalid name [ 2891.975427][ T4707] BPF: [ 2891.975427][ T4707] [ 2891.978153][ T4722] BPF:[1] FUNC_PROTO (anon) [ 2891.984934][ T4715] BPF: [ 2891.984934][ T4715] 09:58:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000002c0), 0xfefe) sendfile(r3, r4, &(0x7f0000000000), 0xffe) sendmmsg(r3, &(0x7f00000048c0)=[{{&(0x7f0000000440)=@in={0x2, 0x4e20, @empty}, 0x80, &(0x7f0000002800)=[{&(0x7f00000004c0)="c7a2911460344721d56926d2954594102d2eaa418f0ed01ec995c1598afff0886da11d3619593aa0dcc82633762b3f072d6a0fd722c8f97e3a556683e3d0310d515e148e4a154c245adc1eee1b56545534534bc1b52c8e45032de36453b0030c27a26b4e90d56697b7659cb95f36eb87e9af5812fd48a9535976d0d5", 0x7c}, {&(0x7f0000000540)="b2605fdee1839cd6bab9aaeb0f9a8acc98f3de1f59e45c2be80744f1b1e4728f1f2e8e66bcee84ff656182", 0x2b}, {&(0x7f0000000580)="32bfc2d212eb814e3e486b8b79da19bc76833419e3c4eab7cf71e7febddfe2cb719bd305a7a764f36231b92943c96e61861c700d90971082eb9d27b8427c35f8d6a95d96bd15fe0f3614c3950b14b178dabb060502bc6ce1cbcc46da8f7456d4638ff213dff2f118502f4f93de7a6e30b7a0b3dba9e43862783cb455c234a1edf828254aff115ddb73b962f9eb96858c4a26b7ef46894c11481c5ec9757c533c905388a25210b7f733462f5ccc3a8dc8e016dab600318214a7436dd3ded961b8814924aedc13cd78cc11db4af8a1daf1eb7b9279663c85", 0xd7}, {&(0x7f0000000680)="aa7cfe0b5c55addf4a3c1d1bb0f29ed71701073049cd632b38bb85cbb6d6", 0x1e}, {&(0x7f0000001800)="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", 0x1000}], 0x5, &(0x7f00000006c0)=[{0x40, 0xff, 0xffffffff, "6b0df99ba01eee9610d82b211d4c7c46474bc344b64c2919377aad43606992a5cf4d78345e76a699aece6b268a0254"}], 0x40}}, {{0x0, 0x0, &(0x7f00000028c0)=[{&(0x7f0000002880)="13963789013cce8ba1fe125cc2d48dda8abb35283f4af3", 0x17}], 0x1, &(0x7f0000002900)=[{0x80, 0x88a258527bccbe87, 0x8, "73d1ea7325832a3dc3561ae56f1f1a5d79a0c5926f7e6510d17ea1bae100ccfae524aeb9d1afd4c2e16679e2298d29b4a76699e564f9ec4fb575bd94fc3eae77f7571db1b93733952789e80e5b58d84cdbf58a40206f57a9a9b7dd10be0e5793dddc1e7ceec0c1fb66bf530b7da212"}, {0x78, 0x100, 0x154, "01f29fdea4ec56ff4dba13cc7117a30fef813473b7922f974d71cf171031a33f9326bf8b6815d50ce945c20ff044f3c0e4174da44db32d49b76e29cd63d4384f2355e6c75146b103f53224bf5f40c06634b85e15174bf86edbbbd711d2d6503418fb"}], 0xf8}}, {{&(0x7f0000002a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @loopback}, 0x2, 0x3, 0x2}}, 0x80, &(0x7f0000002e80)=[{&(0x7f0000002a80)="856713a259af0649362e0c7a1955a220a7e90ac397e45acda792148dcabfcf", 0x1f}, {&(0x7f0000002ac0)="edf71938480e48c53fbd5e135e25cac55e1e89570d28c152544f1cc22c5f31b90c7bdd58fbde6a252e67a19f45f1bcbe9ac720", 0x33}, {&(0x7f0000002b00)="f728430743287e759af6e5991155bdc33deacfd66e9bf0a9a8ed87b07ca3f74a4c67bd90a26af42522f0142759f7658e3da5b4e72f191fb64f8891adae1378149fc04c76f64bb08f227a72ee8745fb2f27a996cb", 0x54}, {&(0x7f0000002b80)="1799bd16ddc4f4e3bca6199fd463763a554d49c72e749998eeccbe3b2fb6016b8222f378f7081cbb277b8f0eb968657f9d33088f6a958cf13e5e360a39f5a23095b038d9b4459ca28a1b5033f4fd042e3283797243b91dd96686961152eb699f126baf814a1c07f266b2c9d3dbc8918900964d82b99103", 0x77}, {&(0x7f0000002c00)="fc3713aca69de6fdce6a77f85506d3b047d79b8032a139af85fa875ed44a7ff4d05af7dee615c414da1cb8944cccccc8de4ab292df629b0ca22db9e27eb0511a8998c16c54f9fd1754d7e6660c3be271f6bb7eab307d57228b1614d9314b5ee332cbb67cf21f6ae3b7ed52d6d1eebcabee5eec1bc441a99f5ee3e986fbee6e9fdfe0bbce9ff5686d323981451b23d84ea398578d3ee2376aa53ab8f0d9e581b3cd6999fc81c0dd22b04abacd533d8544cc0bf5428273832531e2f92c7bd34d5613dc80897f76b141729cb62920f50713", 0xd0}, {&(0x7f0000002d00)="fb05927489701df101eaea56b86408a21dca67036ad39cc72a806e20188a8c4476aac9dfd3d2e339a8311f3d5e21a58fb2d9645f50ca667e1c09b877fe25eb27d95a3681ff3d9fd96bac5f57d73938e2", 0x50}, {&(0x7f0000002d80)="2c15e266ec40a80e644bff6f00533a059a2c287c75679a9503fad558630734ff09851765c59e3c4b58e42e1762803c3d3130044cf11eaf1b83a7b0b41a920a56471c81aaa06ce7590cb03881e879a8515123ef32cbabd1af58e1da56008b60b6fd67392504203750e596e2e624e34d158f5e52cc4bd603de60c21d7a06f27ee88b24f256b75be82432e8715d0b03f1a7e2ce36d8a4b232", 0x97}, {&(0x7f0000002e40)="f9b43a0f6239c20bb7df910ca590720ea38ad3cb3a0f992bb46024fb25501cb0aa3763cc731c2c319f4e", 0x2a}], 0x8, &(0x7f0000002f00)=[{0x48, 0x3d5b8f38f45e904a, 0x4, "011160c26f3bde53b94245e12debd34bcaeb5664599acc6ddb0df432779768e034fc0b0e4717ae095ee0ca0af0e6b9d9f2e5"}, {0x10, 0xb42582a8c915d783, 0xdc}, {0x1010, 0x105, 0x40, "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"}], 0x1068}}, {{&(0x7f0000003f80)=@ethernet={0x6, @dev={[], 0x26}}, 0x80, &(0x7f0000004400)=[{&(0x7f0000004000)="96abefb6587aebdc1a0fbb9038d50498d724e3881f0c551d5fe707ed1ce34992c6cf76402dcd764b53291fabdfeb9b6d3f47638161ff23c83da7ff3e22f5b1a38346897d4191b08440f5645b5f05fd6a90b939df8173158e4a8042732fd6abc88b362c9f937a43e784b9fbb416168e45bce50b2d58c72382bc1f4a3efd9e38f6de90bee421048d952f9f412eab35eca3c56169669afa37c56a65a6f6040e19d5777f07660e3391da1de8ed62662232bfaa873600efe91400fcba2655c9f6cb29818f258b464f562e6e31c2e770ac5a4d78167c97", 0xd4}, {&(0x7f0000004100)="b49c0a6308cef4dcc1115c15085cd6700757258ef34c8c0fc99b3ca9e3d928dd7165fa78089d2e52b1e8b32e1726a550cfac3473271c923dbc5b2a95ee6f002640e3de0006fbf004e0fe88781956aa55368cc577dfcc4c4c516e12df6f8f491b5daa447a342c22c1981b42ce2768f49612aa832d7a0d235d5c4fb2a860b39315804dd0c5489a59d8b6db", 0x8a}, {&(0x7f00000041c0)="db28cc87e24b2103447e23e8b8edba34660f194083a5347fd3dc5c942dbe969724c0330746161d0e5c79167875d0ab647d7faccbc3f603a05cc254c93b0b38c8c7666d60e2e064d80538ddc3703b8bf5e23f1019dfd63e47c48b118d3b11371441d682263e8662b489a26c5ac304a4149debcdbd04170d191393ed4189e50570dc00ad30363ec64388cba8b9066591aedac6e8bb81c1f8793addeaccb1e7cb2c6609ccc1324e3aa016f7d3d0df3323be1d989dcc007e9a82efa88102a986ef38d26411bba4ff82d7ef59f12c9dfa248d896c13673c57e20be81ec970c2f86cdb75a5f665f2046a8db9bc22f2a6ca64", 0xef}, {&(0x7f00000042c0)="49983390b9f8360af8f3073e6800db9e6f30900960fd1d9ef2b0dbbf6f90fb30462c6ee9393ee78d11e9b82f2ee701dc5b6d69a351136b6e4a9cdb903ff897488871ae455440030e1c99beff4eedf52d04edc0285262a5592ce58374eab93bdcf5b7e124", 0x64}, {&(0x7f0000004340)="b10069fa9dda1f6f262695d3db8b545e53d0ce72473f8fdb64583f4589c45f52c2984bea82e8c6182b81fd5d4646b94fff37b2a2f34ca06a14c61795dc35cb51a1a120390dcc9fe26ba006a36e245f9b6c9d9453e8e8ba167b09c87c58a30497e120546005be6a0d74c60bfec3650a2f49f6f918251d84ce5c18aec6080750cbcc1a0289b2028164f9746b8cca4a2f98f7e765ad6cdc460352175c5f6a0d07bc0c6d0ba5d5e28b7a0a33f6cca6b8d6", 0xaf}], 0x5, &(0x7f0000004480)=[{0x20, 0x111, 0x1, "900f5ced227ff03853d9c53a5166d2"}, {0x30, 0x119, 0x186d72f5, "3a06b1e4d87e362c0666dfa9b8a7ec2d5a33f4dcc06163616a6b4b66"}, {0x78, 0x171, 0x400, "c5e10864d80302289712d29ab957b4d1402f8966aa3b075a5e31bbe7fe8c09de63500f6b9e55639721d8693a0e1b96e66646c5f744f360e6a37ca4c972bddbbb1307d875a8f7fab53b032f65115cc503aedef28480dde2b6e9eaadfad9a68afc299098a1"}, {0x70, 0x10e, 0x10000, "55db31ca230bdd789e1c8a80df1e95fa857b8c4fed8c4b8f1c748621681a61dc474cb5f62d8543850d82c3994c7898434fd01449ab9a0b23ff8fdd4d3fc994002418d734746729a77e0c7670da0ed6ff3d12bd84529167ffb5df4e1c"}, {0x10, 0x10a, 0xe8e3}, {0x20, 0x10a, 0x1, "1b71913a591fad30447e"}, {0x80, 0x1, 0x5, "5c5572aab4673aa0f03b3e5a1e838e8bae2febc83b8460f62734d2c23d400f2524bc52e8859cd21d8af6d04d8c1bc6cd7c57c38ecc0175acd9801ae3aaa39b2ff502f80d6984db944ab2b86d46c28cfda9894ce7a894f7f0fd8f56cd4b8e65ed03985fae36e473d40588575b"}, {0x100, 0x10a, 0x1, "d8e7d1143e5fef3f4f276640cb3388d7d88f116ac52d78d5cf2d732bbf000f4b93222c22579d31bd95bf2f35ba4348e753596551e4dff2aa1717813532afbe599991a24f9ea20520e33d53fd33a174ea24d6f8da7258f175058f96f893a45b56c0848c5ae133cbd0e1d8ceedde455ca6ba456d75048ba90cb8520f55af77677a85e19617232d9da865c48212cff97d402c93347c84606b33b0730fd78c683c7f434acf6a7a71b00b9f683fa100bfb15cfa26b98b43cb4305a5b9ea8743cdef5790a8b4250a52f3d3e2376d4774eea3060c75f6a40c07fd9a614e5f6d6a04e7429c703edd327f0b0db2"}, {0x70, 0x6, 0x8, "f5e3a13887bcef137f7713fc3bafc35fb6c768d023b80875ff496be6f9882e4b693516c9294e6abd4da711f87f1ccbeff70d41d141488d082f3ec7d884f48b1ce25e5bcd96cef18432e49936cc68303b1b3ace8cec83bea17d"}], 0x358}}, {{&(0x7f0000004800)=@ipx={0x4, 0xb071, 0x20, "b548e1d55210", 0x7}, 0x80, &(0x7f0000004880)}}], 0x5, 0x40000) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000002c0), 0xfefe) sendfile(r1, r5, &(0x7f0000000000), 0xffe) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/216, 0xd8}, {&(0x7f0000000200)=""/255, 0xff}, {&(0x7f0000000300)=""/225, 0xe1}, {&(0x7f0000000800)=""/4096, 0x1000}], 0x4, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r6, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") ioctl(r6, 0x400000001f, &(0x7f00000000c0)="08002cb5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2892.025175][ T4722] BPF:return=0 args=( [ 2892.032236][ T4726] BPF:[1] DATASEC (anon) [ 2892.040412][ T4722] BPF:0 (invalid-name-offset) [ 2892.041161][ T4725] BPF:Unsupported section found [ 2892.047499][ T4727] BPF:Unsupported flags [ 2892.053637][ T4726] BPF:size=0 vlen=0 [ 2892.058508][ T4722] BPF:, 4 (invalid-name-offset) [ 2892.068013][ T4726] BPF: [ 2892.079562][ T4728] BPF:Unsupported section found [ 2892.088360][ T4730] BPF:Unsupported flags [ 2892.088641][ T4726] BPF:vlen == 0 [ 2892.096217][ T4722] BPF:) [ 2892.096228][ T4722] BPF: [ 2892.127822][ T4726] BPF: [ 2892.127822][ T4726] [ 2892.136750][ T4722] BPF:Invalid arg#1 [ 2892.151109][ T4722] BPF: [ 2892.151109][ T4722] [ 2892.163127][ T4735] BPF:[1] FUNC_PROTO (anon) 09:58:12 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="c0eb010018000000000000000000000c00000002000000000000000000000f000000000000b8f90e2c5a3544cf6e7cffcb2842d7c28a90be1ae67ff7e1e0042d9952aab0b3567fce68dbd4784a70588d60c76b"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:58:12 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2892.175620][ T4732] BPF:[1] ENUM (anon) [ 2892.177140][ T4735] BPF:return=0 args=( [ 2892.194548][ T4735] BPF:0 (invalid-name-offset) [ 2892.207524][ T4732] BPF:size=4 vlen=1 [ 2892.219375][ T4732] BPF: [ 2892.221590][ T4735] BPF:, 4 (invalid-name-offset) [ 2892.248918][ T4732] BPF:Invalid name [ 2892.262815][ T4740] BPF:Section overlap found [ 2892.268781][ T4735] BPF:) [ 2892.281060][ T4732] BPF: [ 2892.281060][ T4732] [ 2892.289671][ T4735] BPF: 09:58:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2892.303357][ T4735] BPF:Invalid arg#1 [ 2892.318563][ T4744] BPF:Section overlap found [ 2892.324540][ T4735] BPF: [ 2892.324540][ T4735] [ 2892.334433][ T4746] BPF:[1] ENUM (anon) [ 2892.347969][ T4746] BPF:size=4 vlen=1 09:58:12 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2892.375224][ T4746] BPF: [ 2892.382295][ T4748] BPF:Invalid magic [ 2892.389182][ T4746] BPF:Invalid name [ 2892.401059][ T4746] BPF: [ 2892.401059][ T4746] [ 2892.418995][ T4751] BPF:Invalid magic 09:58:12 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x8, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2892.424565][ T4750] BPF:Unsupported flags 09:58:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000180)={{0x32, @dev={0xac, 0x14, 0x14, 0x1c}, 0x4e23, 0x2, 'lblcr\x00', 0xd, 0xc70, 0x6c}, {@local, 0x4e22, 0x2, 0x7, 0x6, 0x3ff}}, 0x44) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) r2 = accept4$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c, 0x80000) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000140)=0x4) r3 = accept4$tipc(r1, &(0x7f0000000200), &(0x7f0000000240)=0x10, 0x1000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r4, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r4, 0x6628, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f00000003c0)=0x843, &(0x7f0000000440)=0x4) getsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400000002000000000000000100000604000000000000000000000000000fc9502cd28ba99c224254a8e9f8bff82a15d6cf797898060f84e9e4e4685860453048c22fa286a23b4ea047d58da52ae119f4c66ea4f43ceb8cbf892429696c32dda3b5548864bac8783d752f77d21648091d6ab9749eac2edc86dfc3fcc9cbb9fbf451a62dd48bc8bb6080376a06275c2dbb4274ad9611ff12f7f0f2ebd77975422c6a32"], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) 09:58:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket(0x0, 0x80000, 0x8a) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000002c0)="27d60e9b9b12158a7fc5d034244c68230010467c57b4cb2aaeb1288ac82d225d5fcd0a90e4dbf461eb564e300470d8701a50d8cfe1b4e9835aceadecb60eda83911215065044008aad9bd41e19ceba0d22bf6c1428b19f8ecf943cbfcbd7e626f83d9fec1d4dad25bac0648265965651ba0ecc5731c4be4f5b059ee66ce94c266a2162c0a1b865fa24c429064620bd7ab414cf713d42d29aca8ada61bbf8d5", 0x9f) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xfffffffffffffca9, [@volatile={0x1, 0x0, 0x0, 0x9, 0x1}, @var={0x5, 0x0, 0x0, 0xe, 0x3, 0x1}, @fwd={0xc}, @volatile={0x0, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/227, 0x1d, 0xe3, 0x8}, 0x20) [ 2892.498402][ T4756] BPF:Unsupported flags 09:58:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2892.593890][ T4760] BPF:[1] FUNC_PROTO (anon) 09:58:12 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2892.618736][ T4767] IPVS: set_ctl: invalid protocol: 50 172.20.20.28:20003 [ 2892.626037][ T4760] BPF:return=0 args=( [ 2892.626049][ T4760] BPF:0 (anon) [ 2892.626059][ T4760] BPF:, 4 (invalid-name-offset) [ 2892.626065][ T4760] BPF:) [ 2892.626071][ T4760] BPF: [ 2892.626078][ T4760] BPF:Invalid arg#1 [ 2892.626086][ T4760] BPF: [ 2892.626086][ T4760] [ 2892.627164][ T4764] BPF:[1] FUNC_PROTO (anon) [ 2892.662318][ T4768] BPF:Section overlap found [ 2892.668998][ T4772] BPF:Total section length too long [ 2892.671075][ T4764] BPF:return=0 args=( [ 2892.683474][ T4764] BPF:0 (anon) [ 2892.712113][ T4764] BPF:, 4 (invalid-name-offset) [ 2892.735302][ T4776] BPF:Section overlap found 09:58:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000002c0), 0xfefe) sendfile(r3, r4, &(0x7f0000000000), 0xffe) sendmsg$nl_netfilter(r1, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa08020}, 0xc, &(0x7f00000001c0)={&(0x7f0000000800)={0x594, 0xf, 0x4, 0x0, 0x70bd2d, 0x25dfdbfd, {0x1, 0x0, 0xa}, [@nested={0x264, 0x4b, [@typed={0x8, 0x33, @fd=r3}, @generic="d49a7ce4de9b536d9f394b425c6ff6bd33ec9a97d749a0515500ea43eee122b0bb07ed7880cf40bc08eef0f4446a7d87ca92183fb0423c0b49252fce1bdcc94a32755dc2d5987c6b874ff51429d96e1f60f0f96beeb628ab1482931b5d59e4f4c74c257ec9a42f401541ed88a84a8313eaabbf80f25d713b1188cec3dbce2395ba1dc03776793b4ced6c07320ec87001de3036a3081e1525cfeb9bbe45749606e45e59f20898ad6c53ef92990ecb760d3d853b9e5d33133c05d0849d4e5c8bfcc4f4072f2a24459f", @generic="7d9dfd998bb0871be783eacb4ce5e887a8cb9b29ce12beeba49a8b878df22f6af9970f19470663a7a272b7d13a9880f5c83600df454094ceb667ed4736c7024760", @generic="e98259b5fa02b930e803c241c1b63c665036fbc01486c394d323d4ecc353d7eb544231e1e4dd49acc01f306589e0f8697b557b81b0fd201c4dfc2e0b4c82219598856423059c7d4dbc82d8f7d6e9049be9a557c925f724e5f5332ad5a5216225507b1ea91fec629a391fd7596531dd7f554726241350659c8681b100609e413c256a6a141c5714868eef2dad096953413fc897d822b427f86c1d300fd0667405468a45423d308eb85ee554c59be27941d4aa22f2d87a780ccecdb05e7db6c079ea4253461dbeccf22a40e9750b6b", @generic="ad0813d39de80ea6c4e61db3b624eb3a95f48d5141267f8f34d328cebee0b65abca56916cea48e3f9fd364cf8417fa0cdfb19fad7d565defbd64672f8f3a053045f80f1c14b74dffeb8e16a0fe31ea246147ef483dcd11d7ed4cabf74e51b266d381bd91b15a4c478a4426d4cc5e7aee2d4c41be7dff", @typed={0x8, 0x3f, @u32=0x200}]}, @typed={0xc, 0x1d, @u64=0xff}, @generic="1d6dc4874313e058699729ef2c1fa32710cc9ecfaf654ae85f65d5558d71e5acb1801b3c688b6f9ac82deab4d37f0edde442d6e3d872a22fc202c6d9ddd30deeb04c6c2a4a68cc92b0c40be260cfcd9fd3dd6de6668c2c7f69a3e435ebb31e569c743a4bd9563408028abc97fa18df97471b83d3dbdb8ba7e3ab1cf1b30ddd9160a562274c2acf98efe696eaee92d27ec76c369934edf4e0f743c64ae2e0940f2370b32c1013bf00e6e1cad1c2f5fe98ffe1042d29c5b6b761e09206e00433e77337e23b2800fde34dec8ad3c45a0407574643066798b8c97b242f498395e5c77f0c5dd5aba4bb83fc02a9abc536675cd4a11e91eb15", @generic="fc4bbbd1d8efb0378fd190ac30f9ca96547564036b990fe2e0c19b72985512394d74739bec3ed48d99ad96382abac5690f62f571da6d13b7fd023cd20011d3becdca68029001e6d5ba2bdb7ec117faf9e8faebbed30637c4566dcf4f9be4eb3ccfb06d7d99efa5f9380f4b66bbd352a47cf34ad17235cf56fc137b87ffc19f1d1fe2d01e88080d445184d6151ba42280066043ea1f2b0ea1300bd72d92b515da2c1724a24c782744624fafdb099816d2d0bd3f56b0ad446ea12673a6fa561246049f96c4ed35e70d0b4ddfda9f73beca347d7b1586c81a0526ed06276296f1709e2db053538ed72f", @typed={0x8, 0x81, @ipv4=@rand_addr=0x1f}, @generic="b8836d23a97fff08b5f4cbc3043058971b5b64d204110309d0c37dc6d88e037bd19141b9de914376db59e6bad92e134ed86cd7cfcbffcfc0e27783fa62650b1127570606278c6195cc67ae67671a2e263c32121cc06eb954f086cf0129000b9d4d9757e99a579260f9ca24a588ddb1e330f44d8265bedc8c20c1ff719708beb0b0a432b879d280bbb71ee75071397b07f79a89cc07d3b64f2c66ec501a345c49b84b662546df3e16f70edb5b0e5a5640fa2565d9e60f77f470ec4c05b149b53b078901bab706a9f3750749b9a8ec00ca", @generic="9d039b9aafa4847d0290df28ba6646566ae7263188f21828bf684e3931f7fb85d706891b4325d2554465c03911b1a14ca1fadcd5b46bd25829df7ca1888fb86a4eee7b42f5074df3adc8325a1e4dd2bc44650bf1073cb837"]}, 0x594}, 0x1, 0x0, 0x0, 0x40010}, 0x8004) setsockopt(0xffffffffffffffff, 0x7, 0x81, &(0x7f0000000080)="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", 0xfe) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") ioctl$sock_proto_private(r5, 0x89e3, &(0x7f0000000dc0)="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") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2892.760667][ T4772] BPF:Total section length too long [ 2892.772324][ T4778] BPF:[1] ENUM (anon) [ 2892.777514][ T4779] BPF:Unsupported flags [ 2892.783415][ T4764] BPF:) [ 2892.789780][ T4764] BPF: [ 2892.797473][ T4764] BPF:Invalid arg#1 [ 2892.807756][ T4764] BPF: 09:58:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2892.807756][ T4764] [ 2892.810386][ T4778] BPF:size=4 vlen=1 [ 2892.817044][ T4780] BPF:Unsupported flags 09:58:12 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0xb, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2892.853185][ T4778] BPF: [ 2892.870566][ T4778] BPF:Invalid name 09:58:12 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2892.905957][ T4778] BPF: [ 2892.905957][ T4778] 09:58:12 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xc, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x2b, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2892.999238][ T4792] BPF:Section overlap found [ 2893.027743][ T4793] BPF:Section overlap found [ 2893.037975][ T4795] BPF:[1] FUNC_PROTO (anon) [ 2893.053095][ T4794] BPF:[1] DATASEC (anon) [ 2893.078631][ T4795] BPF:return=0 args=( [ 2893.098271][ T4794] BPF:size=0 vlen=0 [ 2893.104238][ T4799] BPF:Unsupported flags [ 2893.111246][ T4795] BPF:2 (anon) [ 2893.114944][ T4795] BPF:, 4 (invalid-name-offset) 09:58:13 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x12, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2893.138176][ T4795] BPF:) [ 2893.141318][ T4803] BPF:Unsupported flags [ 2893.151839][ T4794] BPF: [ 2893.167287][ T4795] BPF: [ 2893.170183][ T4795] BPF:Invalid arg#1 [ 2893.174384][ T4794] BPF:vlen == 0 09:58:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x34, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2893.190474][ T4794] BPF: [ 2893.190474][ T4794] [ 2893.220229][ T4795] BPF: [ 2893.220229][ T4795] [ 2893.226506][ T4806] BPF:Unsupported section found [ 2893.241417][ T4807] BPF:Unsupported section found [ 2893.282260][ T4809] BPF:[1] FUNC_PROTO (anon) [ 2893.299523][ T4809] BPF:return=0 args=( [ 2893.320390][ T4809] BPF:2 (anon) [ 2893.340855][ T4809] BPF:, 4 (invalid-name-offset) [ 2893.364476][ T4809] BPF:) [ 2893.367405][ T4809] BPF: [ 2893.370313][ T4809] BPF:Invalid arg#1 [ 2893.380002][ T4809] BPF: [ 2893.380002][ T4809] [ 2893.416542][ T4778] IPVS: set_ctl: invalid protocol: 50 172.20.20.28:20003 [ 2893.457775][ T4816] BPF:[1] ENUM (anon) [ 2893.469785][ T4816] BPF:size=4 vlen=1 [ 2893.488585][ T4816] BPF: 09:58:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000014003a2f140000000200000000000000010000060400000000000000000000000008"], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) 09:58:13 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xf, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:13 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x35, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2893.507328][ T4816] BPF:Invalid name [ 2893.514426][ T4816] BPF: [ 2893.514426][ T4816] [ 2893.607537][ T4824] BPF:Unsupported flags [ 2893.629484][ T4826] BPF:Unsupported flags [ 2893.719722][ T4830] BPF:Total section length too long [ 2893.723480][ T4794] BPF:[1] DATASEC (anon) [ 2893.747512][ T4794] BPF:size=0 vlen=0 [ 2893.762605][ T4794] BPF: 09:58:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r2, r3, &(0x7f0000000000), 0xffe) recvmmsg(r2, &(0x7f000000a580)=[{{&(0x7f00000000c0)=@in, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/66, 0x42}, {&(0x7f00000001c0)=""/115, 0x74}, {&(0x7f0000000240)=""/174, 0xae}, {&(0x7f0000000300)=""/176, 0xb0}], 0x4, &(0x7f0000000800)=""/4096, 0x1000}, 0x5}, {{&(0x7f0000000440)=@un=@abs, 0x80, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/78, 0x4e}, {&(0x7f0000000540)=""/183, 0xb7}, {&(0x7f0000000600)=""/146, 0x92}, {&(0x7f0000001800)=""/137, 0x89}], 0x4, &(0x7f00000018c0)=""/68, 0x44}, 0x4}, {{&(0x7f0000001940)=@ll, 0x80, &(0x7f00000006c0)=[{&(0x7f00000019c0)=""/253, 0xfd}, {&(0x7f0000001ac0)=""/75, 0x4b}], 0x2, &(0x7f0000001b40)=""/109, 0x6d}, 0x6}, {{&(0x7f0000001bc0)=@in, 0x80, &(0x7f0000004000)=[{&(0x7f0000001c40)=""/120, 0x78}, {&(0x7f0000001cc0)=""/74, 0x4a}, {&(0x7f0000001d40)=""/4096, 0x133d}, {&(0x7f0000002d40)=""/182, 0xb6}, {&(0x7f0000002e00)=""/224, 0xe0}, {&(0x7f0000002f00)=""/214, 0xd6}, {&(0x7f0000003000)=""/4096, 0x1000}], 0x7, &(0x7f0000004080)=""/96, 0x60}, 0x9}, {{&(0x7f0000004100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000004340)=[{&(0x7f0000004180)=""/176, 0xb0}, {&(0x7f0000004240)=""/126, 0x7e}, {&(0x7f00000042c0)=""/117, 0x79}], 0x3, &(0x7f0000004380)=""/73, 0x49}, 0x5058b71f}, {{&(0x7f0000004400)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000004800)=[{&(0x7f0000004480)=""/23, 0x17}, {&(0x7f00000044c0)=""/252, 0xfc}, {&(0x7f00000045c0)=""/124, 0x7c}, {&(0x7f0000004640)=""/176, 0xb0}, {&(0x7f0000004700)=""/247, 0xf7}], 0x5, &(0x7f0000004880)=""/191, 0xbf}, 0x80}, {{&(0x7f0000004940)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000008c80)=[{&(0x7f00000049c0)=""/4096, 0x1000}, {&(0x7f00000059c0)=""/110, 0x6e}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/83, 0x53}, {&(0x7f0000006ac0)=""/4096, 0x1000}, {&(0x7f0000007ac0)=""/131, 0x83}, {&(0x7f0000007b80)=""/239, 0xf7}, {&(0x7f0000007c80)=""/4096, 0x1000}], 0x8, &(0x7f0000008d00)=""/124, 0x7c}}, {{&(0x7f0000008d80)=@nl=@unspec, 0x80, &(0x7f000000a140)=[{&(0x7f0000008e00)=""/173, 0xad}, {&(0x7f0000008ec0)=""/227, 0xe3}, {&(0x7f0000008fc0)=""/79, 0x4f}, {&(0x7f0000009040)=""/224, 0xe0}, {&(0x7f0000009140)=""/4096, 0x1000}], 0x5, &(0x7f000000a1c0)=""/101, 0x65}, 0x5}, {{&(0x7f000000a240)=@nl, 0x80, &(0x7f000000a300)=[{&(0x7f000000a2c0)=""/59, 0x3b}], 0x1, &(0x7f000000a340)=""/142, 0x8e}, 0x9}, {{&(0x7f000000a400)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f000000a500)=[{&(0x7f000000a480)=""/87, 0x57}], 0x1, &(0x7f000000a540)=""/52, 0x34}, 0x7}], 0xa, 0x18001, &(0x7f000000a8c0)={0x77359400}) getsockopt$rose(r4, 0x104, 0x2, &(0x7f000000a840), &(0x7f000000a880)=0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000fcffffff0000000f006c4730ff7b2dbc81963bc846b4f8dbb20000000000"], &(0x7f0000000700)=""/220, 0x4, 0xdc, 0x8}, 0x20) 09:58:13 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x18, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:13 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x4a, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:13 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x3}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2893.768595][ T4794] BPF:vlen == 0 [ 2893.772512][ T4794] BPF: [ 2893.772512][ T4794] [ 2893.797820][ T4833] BPF:Total section length too long 09:58:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000000000145db1aac53905a400"/46], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2893.845625][ T4838] BPF:[1] FUNC_PROTO (anon) [ 2893.850263][ T4838] BPF:return=0 args=( [ 2893.862952][ T4839] BPF:Unsupported flags [ 2893.866254][ T4840] BPF:[1] Invalid name_offset:2 [ 2893.889477][ T4842] BPF:[1] Invalid name_offset:2 [ 2893.893808][ T4838] BPF:3 (anon) [ 2893.899104][ T4843] BPF:Unsupported flags [ 2893.904625][ T4838] BPF:, 4 (invalid-name-offset) [ 2893.909624][ T4838] BPF:) [ 2893.915102][ T4838] BPF: 09:58:13 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x4}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2893.939023][ T4838] BPF:Invalid arg#1 [ 2893.958060][ T4838] BPF: [ 2893.958060][ T4838] [ 2893.966373][ T4846] BPF:Invalid section offset [ 2893.982798][ T4848] BPF:Invalid section offset 09:58:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:13 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2893.987685][ T4849] BPF:[1] FUNC_PROTO (anon) [ 2894.045349][ T4849] BPF:return=0 args=( [ 2894.084283][ T4849] BPF:3 (anon) [ 2894.088287][ T4856] BPF:[1] Invalid name_offset:4 [ 2894.106817][ T4853] BPF:hdr_len not found [ 2894.107351][ T4859] BPF:[1] Invalid name_offset:4 [ 2894.117480][ T4858] BPF:Unsupported version [ 2894.121077][ T4849] BPF:, 4 (invalid-name-offset) [ 2894.123315][ T4860] BPF:Unsupported version 09:58:14 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x8}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2894.140713][ T4862] BPF:hdr_len not found [ 2894.150488][ T4849] BPF:) 09:58:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:14 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)={0x0, 0xfffffffe}) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x6628, 0x0) write$nbd(r2, &(0x7f0000000180)={0x67446698, 0x0, 0x1, 0x4, 0x2, "b4dc2cccfe30f0d8790f80e398ac6a0c246b51194810833b63a287710e14668727595f4571eb5ce583f9d194a47f44e0edd0045dbbd99496d7e29a43a58dc041"}, 0x50) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r3, 0x110, 0x4, &(0x7f00000000c0)=0x2, 0x4) 09:58:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9fc4d90000000000f6ffffffffffffff0000003bc400000000e8e4825f56029300000000000000016b69e99a456636cf93dc38ba878695aae4671b9056c62f9f0f942b583a6a498d5f13a57973cdbf0217ce14f70532c07417314db4fa9e428ccc21769848dbb1170c7ca9c85f9ce861701cdb8ab12f7667066fdf02000000ef4310c55d979238a6ab13d721970970b7cbb09481b1"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2894.191369][ T4849] BPF: [ 2894.211166][ T4849] BPF:Invalid arg#1 [ 2894.231386][ T4849] BPF: [ 2894.231386][ T4849] [ 2894.257220][ T4866] BPF:Unsupported flags [ 2894.283273][ T4873] BPF:Unsupported flags [ 2894.288255][ T4872] BPF:[1] ENUM (anon) [ 2894.301420][ T4872] BPF:size=4 vlen=1 [ 2894.317935][ T4874] BPF:[1] Invalid name_offset:8 09:58:14 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x4}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2894.343275][ T4876] BPF:Unsupported version [ 2894.358083][ T4872] BPF: [ 2894.361480][ T4872] BPF:Invalid name [ 2894.367975][ T4872] BPF: [ 2894.367975][ T4872] [ 2894.374162][ T4880] BPF:[1] Invalid name_offset:8 09:58:14 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2894.397039][ T4881] BPF:Unsupported version [ 2894.416634][ T4879] BPF:Invalid magic 09:58:14 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x10}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2894.444501][ T4884] BPF:Invalid magic 09:58:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1d, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2894.505435][ T4887] BPF:[1] FUNC_PROTO (anon) [ 2894.514768][ T4887] BPF:return=0 args=( [ 2894.532659][ T4887] BPF:4 (anon) [ 2894.541524][ T4887] BPF:, 4 (invalid-name-offset) [ 2894.555962][ T4887] BPF:) [ 2894.556572][ T4891] BPF:Unsupported flags [ 2894.560854][ T4892] BPF:[1] Invalid name_offset:16 [ 2894.586327][ T4895] BPF:[1] Invalid name_offset:16 [ 2894.603316][ T4887] BPF: 09:58:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9f0000100c0000fd1c0000000f00000000002e002e61616186b67502c5"], &(0x7f0000000700)=""/220, 0x30, 0xdc, 0x8}, 0x20) [ 2894.606765][ T4887] BPF:Invalid arg#1 [ 2894.610982][ T4897] BPF:Unsupported flags [ 2894.622104][ T4887] BPF: [ 2894.622104][ T4887] [ 2894.632662][ T4896] BPF:Unsupported version [ 2894.648044][ T4898] BPF:[1] FUNC_PROTO (anon) 09:58:14 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x12}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2894.653281][ T4899] BPF:Unsupported version [ 2894.670794][ T4898] BPF:return=0 args=( [ 2894.686369][ T4898] BPF:4 (anon) [ 2894.696219][ T4898] BPF:, 4 (invalid-name-offset) 09:58:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x25, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2894.725674][ T4898] BPF:) [ 2894.728651][ T4902] BPF:btf_header not found [ 2894.750307][ T4898] BPF: [ 2894.754634][ T4904] BPF:btf_header not found [ 2894.766567][ T4898] BPF:Invalid arg#1 09:58:14 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x60, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2894.775242][ T4898] BPF: [ 2894.775242][ T4898] 09:58:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r2, r3, &(0x7f0000000000), 0xffe) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) setsockopt$inet_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{0x304}, "4a9b20fb232450d5", "e9ce1aa159aa97445aaf3cddeb79d33014829505d0ff88e53a110246ef5fd179", "3e14c2ab", "6515d3d465acb298"}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x8, 0x0, 0x0, 0xb, 0x2}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2894.840144][ T4907] BPF:[1] Invalid name_offset:18 09:58:14 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x5}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2894.867147][ T4911] BPF:[1] Invalid name_offset:18 [ 2894.867735][ T4910] BPF:Unsupported version [ 2894.911834][ T4914] BPF:Unsupported version [ 2894.953907][ T4917] BPF:Unsupported flags [ 2894.978926][ T4919] BPF:[1] FUNC_PROTO (anon) [ 2894.986801][ T4921] BPF:Unsupported flags [ 2895.012656][ T4919] BPF:return=0 args=( [ 2895.025144][ T4919] BPF:5 (anon) [ 2895.034215][ T4919] BPF:, 4 (invalid-name-offset) [ 2895.039276][ T4920] BPF:[1] Invalid name_offset:8 [ 2895.060995][ T4919] BPF:) [ 2895.063923][ T4919] BPF: [ 2895.069382][ T4924] BPF:[1] Invalid name_offset:8 [ 2895.089288][ T4872] BPF:[1] ENUM (anon) [ 2895.106860][ T4919] BPF:Invalid arg#1 [ 2895.111988][ T4919] BPF: [ 2895.111988][ T4919] [ 2895.117108][ T4872] BPF:size=4 vlen=1 [ 2895.130223][ T4872] BPF: [ 2895.139949][ T4872] BPF:Invalid name [ 2895.150507][ T4926] BPF:[1] FUNC_PROTO (anon) [ 2895.155304][ T4926] BPF:return=0 args=( [ 2895.159392][ T4872] BPF: [ 2895.159392][ T4872] [ 2895.174046][ T4926] BPF:5 (anon) [ 2895.177565][ T4926] BPF:, 4 (invalid-name-offset) 09:58:15 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="9feb01001800000000000000140000008fffffff41000000000000000000000d00000000010000000000000000000000000000843f00000005000000020000000100000007000000040000008000000005000000050000003f000000020000000000000f0000000002000000050000007303000001000000060000000900000003000000000400000500000005000000feffffff000900000300000001000080c000000093090000000000000567d400000a0000000500000008000000000000000000000d000000000004000003000000ffffffff0500000001000000020000001000000004000000000000000100000002000000ffffffff0a000000000000000500000002000000000000000000000d000000000b00000003000000060000000000000a030000000000000000600507d8c22b2059fce2e8b9a5042f3f736181e1d8f520ddf1ee5fcbae354f418e2f4658fa05325ce443562f619d3daadc16a72660d19d5597b21f97a0670ddbc94e5a74f66ea9829aac6f80c6d622bd7440646099139425e8f5d0a8deccffc9ab88c65da4"], &(0x7f0000000700)=""/216, 0x2e, 0xd8, 0x8}, 0x20) 09:58:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x2b, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:15 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x6628, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000440)=ANY=[@ANYRES32=r3, @ANYBLOB="000000007f2301362c65ffac3795df0261723a42a8d483c506aadaea6a001f6374b1a25e22a4ebc9"], &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)={r3, 0x3, 0x4, [0x2, 0xe63, 0xe15d, 0x40]}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000002c0)={r4, 0xf3, "87ad8274200435c6f07e9601fd86d5b25c7a50c6805737d89f154c26c362a83d9f3bbb36eaee0d4c39bfb2d37cd2a908da07f6edfda4d0733db6a39a3c5156ec8e5a9337255e54f9d65d02c7bd5aeeb08217cdc7e264f48e5363b7ecb1f0876a2da6407a829e14509781d5309b50c15b66f5585db5ee281f55487ae5bdc509203b5ba48ce804c9fb9f34388ea10e8ae704638c23d53bc2516321a61930135fb0861a9f13f375f058ead864f375f93e57c9094e1aa7c363b03f2a1951b64008147697514e1a23a8a5738be62eb9dd4c18049ba771fc618aed38dcaf3d6aade18e63d65787e028c0a48b0ccb67926e7f7fb04af0"}, &(0x7f00000003c0)=0xfb) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, &(0x7f0000000080)={0x0, 0x6b8}, 0x8) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000140)={{{@in6, @in=@remote}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000240)=0xe8) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x10000000003, 0x0) r7 = socket$kcm(0x11, 0x3, 0x300) r8 = socket$kcm(0x2, 0x1000000000000002, 0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r9, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x4) sendmsg$kcm(r8, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x100000000004e23, @dev={0xac, 0x14, 0x14, 0xc}}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r8, 0x0, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x2d1cfc198ef7c147) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r10, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x47}) [ 2895.195785][ T4926] BPF:) [ 2895.198724][ T4926] BPF: [ 2895.205809][ T4926] BPF:Invalid arg#1 [ 2895.209756][ T4926] BPF: [ 2895.209756][ T4926] 09:58:15 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x6}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2895.257282][ T4933] BPF:[1] Invalid name_offset:219 [ 2895.280610][ T4935] BPF:Unsupported flags [ 2895.285646][ T4934] BPF:Unsupported version [ 2895.301409][ T4938] BPF:Unsupported version [ 2895.318604][ T4940] BPF:[1] Invalid name_offset:219 [ 2895.342037][ T4941] BPF:Unsupported flags 09:58:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x34, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:15 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x334}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2895.376493][ T4943] BPF:[1] FUNC_PROTO (anon) [ 2895.426870][ T4943] BPF:return=0 args=( [ 2895.437246][ T4943] BPF:6 (anon) [ 2895.460766][ T4943] BPF:, 4 (invalid-name-offset) [ 2895.511106][ T4943] BPF:) [ 2895.515459][ T4943] BPF: [ 2895.537047][ T4952] BPF:Unsupported version [ 2895.542165][ T4951] BPF:[1] Invalid name_offset:820 [ 2895.553242][ T4943] BPF:Invalid arg#1 [ 2895.564014][ T4943] BPF: [ 2895.564014][ T4943] [ 2895.570769][ T4955] BPF:Unsupported version [ 2895.582648][ T4954] BPF:Unsupported flags [ 2895.583772][ T4957] BPF:[1] Invalid name_offset:820 [ 2895.598251][ T4958] BPF:Unsupported flags [ 2895.603006][ T4959] BPF:[1] FUNC_PROTO (anon) [ 2895.608163][ T4956] BPF:Invalid section offset 09:58:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x35, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2895.614139][ T4959] BPF:return=0 args=( [ 2895.625165][ T4960] BPF:Invalid section offset [ 2895.640234][ T4959] BPF:6 (anon) 09:58:15 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x1200}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2895.662837][ T4959] BPF:, 4 (invalid-name-offset) [ 2895.681038][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2895.685962][ T4959] BPF:) [ 2895.686866][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2895.695508][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2895.701341][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2895.702412][ T4959] BPF: [ 2895.707180][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2895.715811][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2895.723782][ T4959] BPF:Invalid arg#1 09:58:15 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYRES64=r0], &(0x7f0000000700)=""/220, 0x2e, 0x23f, 0x8}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) accept$alg(r2, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340), 0x10) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000003c0), 0x0, [{}, {}]}, 0x98) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) getsockopt$nfc_llcp(r1, 0x118, 0x1, &(0x7f00000000c0)=""/166, 0xa6) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000480)={r6}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={r6, @in6={{0xa, 0x4e24, 0x1dcaf22b, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}}, 0x3, 0xe2a}, &(0x7f0000000280)=0x90) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000002c0)={r7, 0x8000, 0x20, 0x8, 0x2dd}, &(0x7f0000000300)=0x18) [ 2895.762487][ T4959] BPF: [ 2895.762487][ T4959] [ 2895.774714][ T4966] BPF:Unsupported flags [ 2895.800597][ T4968] BPF:Unsupported version [ 2895.820199][ T4969] BPF:Unsupported flags 09:58:15 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x7}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2895.841061][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2895.842308][ T4970] BPF:[1] Invalid name_offset:4608 [ 2895.846919][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2895.861054][ T4972] BPF:Unsupported version [ 2895.893562][ T4974] BPF:[1] Invalid name_offset:4608 09:58:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2895.921029][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2895.927176][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2895.935330][ T4975] BPF:Invalid magic 09:58:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x4a, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2896.041937][ T4979] BPF:[1] FUNC_PROTO (anon) [ 2896.052363][ T4979] BPF:return=0 args=( [ 2896.064703][ T4981] BPF:Unsupported flags [ 2896.072646][ T4979] BPF:7 (anon) [ 2896.081087][ T4986] BPF:Unsupported flags [ 2896.081913][ T4979] BPF:, 4 (invalid-name-offset) [ 2896.114242][ T4979] BPF:) [ 2896.124214][ T4979] BPF: [ 2896.133769][ T4979] BPF:Invalid arg#1 [ 2896.143681][ T4979] BPF: [ 2896.143681][ T4979] [ 2896.153702][ T4987] BPF:Unsupported version [ 2896.164458][ T4988] BPF:[1] FUNC_PROTO (anon) [ 2896.169939][ T4989] BPF:Unsupported version [ 2896.175987][ T4988] BPF:return=0 args=( [ 2896.185879][ T4988] BPF:7 (anon) [ 2896.199019][ T4988] BPF:, 4 (invalid-name-offset) [ 2896.205805][ T4988] BPF:) [ 2896.210448][ T4988] BPF: [ 2896.219104][ T4988] BPF:Invalid arg#1 [ 2896.228769][ T4988] BPF: [ 2896.228769][ T4988] 09:58:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xdb, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:16 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x3403}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:16 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:16 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x8}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(0xffffffffffffffff, &(0x7f00000006c0)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) r1 = socket(0x0, 0xa, 0xff) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "01d5a044158d0767", "e6269a7eef2d79615f2facfc610fde73bf2dc7c83f29129bce3fde88caea9f64", "c73259ec", "73784c414e6a822e"}, 0x38) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r3 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x100000) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="000426bd7000fbdbdf250940000008000400faffffff"], 0x1c}, 0x1, 0x0, 0x0, 0x40001}, 0x20000000) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f0000000200)={{0x2, 0x4e24, @remote}, {0x6, @broadcast}, 0x0, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2b}}, 'teql0\x00'}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") sendmsg$inet(r2, &(0x7f0000000680)={&(0x7f00000003c0)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000540)=[{&(0x7f0000000440)="a3fac4d61cffa23ee0d363e7946417e3e43376d2ff1e00a2a108b3d0f653ecbfe93d75947f278b5e3e721e1c92b74a48", 0x30}, {&(0x7f0000000480)="d7091db184fd152e9bef535e6056da6fb7c703a8", 0x14}, {&(0x7f00000004c0)="5a40132dcbd5b5585a460d8bf97320b7df7ce89a49faa109f48f", 0x1a}, {&(0x7f0000000500)="961f6fd1ccafd80abdc49cb69bfec02d1644c708ff8fbe8e621c08857d7e6a6cf843308e996630f6547fd2c40168cbf25a144b28e875696103", 0x39}], 0x4, &(0x7f0000000580)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0xeb04}}, @ip_retopts={{0x28, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x2, 0x3, 0x7, [{[], 0x6}, {[@multicast2], 0xd2}, {[@local], 0x6d}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x76}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1334}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_retopts={{0x28, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x1, 0xd, [{}, {[@multicast1], 0xffff}, {[], 0xffff}, {[], 0x7b43}]}]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@lsrr={0x83, 0x7, 0x81, [@remote]}, @end]}}}], 0xf8}, 0x81a) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)={0x3, 0x5}, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000f70b0000000c00000002000000000000000000000f24b80d7cbde50f000000000000a913eed2fd666281b9bb3478db0c0098b1d0e7f1c8706c377c5ee1ea3a9df4a8118b931e9c287fd6ff6c456a039e0aee06df911cf6fc1ba6becb9f9deb61ee41f489aec6ba21cf63bc170ddd20024fb6e3a5f45e3548093c4ed035e78fb88db2efa5744681fc3ea77ef1bd54f86feb341a1d0502540f4f3bcc52066f6931a128c80af5e2c1a1b46354e073985efbc330a603e7a693173d3b407ad511eeff09452db64061e3643a"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2896.386217][ T4995] BPF:[1] INT (anon) [ 2896.406291][ T4995] BPF:size=0 bits_offset=9 nr_bits=0 encoding=(none) [ 2896.414025][ T4998] BPF:Unsupported flags [ 2896.415102][ T5000] BPF:[1] Invalid name_offset:13315 [ 2896.423924][ T4999] BPF:[1] FUNC_PROTO (anon) [ 2896.431099][ T4995] BPF: [ 2896.433126][ T4999] BPF:return=0 args=( [ 2896.438343][ T4995] BPF:nr_bits exceeds type_size [ 2896.443576][ T5001] BPF:Unsupported flags [ 2896.452388][ T5002] BPF:[1] Invalid name_offset:13315 [ 2896.458934][ T4999] BPF:8 (anon) [ 2896.463014][ T4995] BPF: [ 2896.463014][ T4995] [ 2896.469308][ T4999] BPF:, 4 (invalid-name-offset) 09:58:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x9, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:16 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x4000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2896.488139][ T4999] BPF:) [ 2896.491936][ T5003] BPF:[1] INT (anon) [ 2896.503848][ T4999] BPF: [ 2896.509023][ T5003] BPF:size=0 bits_offset=9 nr_bits=0 encoding=(none) [ 2896.532528][ T4999] BPF:Invalid arg#1 [ 2896.547306][ T5003] BPF: [ 2896.557967][ T5003] BPF:nr_bits exceeds type_size [ 2896.561050][ T4999] BPF: [ 2896.561050][ T4999] [ 2896.584518][ T5003] BPF: [ 2896.584518][ T5003] [ 2896.618135][ T5009] BPF:[1] FUNC_PROTO (anon) 09:58:16 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2896.663718][ T5009] BPF:return=0 args=( [ 2896.669515][ T5012] BPF:[1] Invalid name_offset:16384 [ 2896.678448][ T5009] BPF:8 (anon) [ 2896.687553][ T5015] BPF:[1] Invalid name_offset:16384 [ 2896.693261][ T5009] BPF:, 4 (invalid-name-offset) [ 2896.705057][ T5009] BPF:) [ 2896.723491][ T5009] BPF: [ 2896.735041][ T5018] BPF:Invalid section offset [ 2896.738708][ T5009] BPF:Invalid arg#1 [ 2896.744629][ T5016] BPF:Unsupported section found [ 2896.744662][ T4982] BPF:Invalid magic [ 2896.762872][ T5019] BPF:Unsupported section found [ 2896.772296][ T5009] BPF: [ 2896.772296][ T5009] [ 2896.789019][ T5022] BPF:Unsupported flags [ 2896.815346][ T5024] BPF:Unsupported flags 09:58:16 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0xa}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:16 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0xdb00}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:16 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@union={0x0, 0x0, 0x0, 0xf, 0x0, 0x10002}]}, {0x0, [0x2e, 0x80749b9787eb55c9, 0x2e, 0xcc, 0x0, 0x9891beddfe267679]}}, &(0x7f0000000700)=""/207, 0x2c, 0xcf, 0x8}, 0x20) 09:58:16 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r2, r3, &(0x7f0000000000), 0xffe) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r4, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r4, 0x6628, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000480)={r7}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000100)={r7, 0x9}, &(0x7f0000000140)=0xc) r8 = accept4(r2, 0x0, &(0x7f0000000000), 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r9, &(0x7f0000000600)=ANY=[@ANYPTR64], 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_mreq(r9, 0x29, 0x15, &(0x7f0000000200)={@rand_addr="5218721cd3033e4d1958a14070c7fae7", r10}, 0x187) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001ac0)={'team0\x00', r10}) setsockopt$packet_drop_memb(r8, 0x107, 0x2, &(0x7f0000001b00)={r11, 0x1, 0x6, @broadcast}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2897.040045][ T5038] BPF:Unsupported flags [ 2897.041763][ T5042] BPF:[1] FUNC_PROTO (anon) [ 2897.044424][ T5039] BPF:Unsupported section found [ 2897.054169][ T5042] BPF:return=0 args=( [ 2897.056426][ T5041] BPF:[1] Invalid name_offset:56064 [ 2897.063767][ T5042] BPF:10 (anon) [ 2897.067235][ T5042] BPF:, 4 (invalid-name-offset) [ 2897.072885][ T5040] BPF:[1] DATASEC (anon) [ 2897.077335][ T5040] BPF:size=65538 vlen=0 [ 2897.083007][ T5043] BPF:Unsupported flags [ 2897.083149][ T5040] BPF: [ 2897.092023][ T5044] BPF:[1] Invalid name_offset:56064 [ 2897.097341][ T5042] BPF:) [ 2897.100368][ T5040] BPF:vlen == 0 [ 2897.114339][ T5040] BPF: [ 2897.114339][ T5040] [ 2897.119572][ T5045] BPF:Unsupported section found [ 2897.136464][ T5042] BPF: 09:58:17 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0xfffff}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:17 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2897.139283][ T5042] BPF:Invalid arg#1 [ 2897.150818][ T5048] BPF:[1] DATASEC (anon) [ 2897.169228][ T5042] BPF: [ 2897.169228][ T5042] [ 2897.179902][ T5048] BPF:size=65538 vlen=0 [ 2897.223501][ T5052] BPF:[1] FUNC_PROTO (anon) 09:58:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x1d, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2897.249394][ T5052] BPF:return=0 args=( [ 2897.260446][ T5048] BPF: [ 2897.279800][ T5052] BPF:10 (anon) [ 2897.296338][ T5056] BPF:Unsupported flags [ 2897.300714][ T5052] BPF:, 4 (invalid-name-offset) [ 2897.310094][ T5048] BPF:vlen == 0 [ 2897.314002][ T5059] BPF:Unsupported flags [ 2897.315643][ T5052] BPF:) [ 2897.325185][ T5055] BPF:[1] Invalid name_offset:1048575 [ 2897.328243][ T5048] BPF: [ 2897.328243][ T5048] [ 2897.336330][ T5057] BPF:[1] ENUM (anon) 09:58:17 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2897.351065][ T5060] BPF:[1] Invalid name_offset:1048575 [ 2897.352873][ T5052] BPF: [ 2897.370049][ T5052] BPF:Invalid arg#1 [ 2897.376414][ T5057] BPF:size=4 vlen=1 [ 2897.382491][ T5052] BPF: [ 2897.382491][ T5052] [ 2897.403722][ T5057] BPF: [ 2897.408835][ T5057] BPF:Invalid name [ 2897.431277][ T5062] BPF:Unsupported btf_header [ 2897.437767][ T5057] BPF: [ 2897.437767][ T5057] 09:58:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9fa783600fd1a08502c31a12dcf1c1310c00000002000000000000000000000f000000000000"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0xfffffffffffffe73) 09:58:17 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x400000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2897.458626][ T5066] BPF:Unsupported btf_header 09:58:17 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x1c}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2897.493854][ T5065] BPF:Unsupported flags 09:58:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x27, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2897.524506][ T5070] BPF:Unsupported flags 09:58:17 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2897.613919][ T5074] BPF:[1] Invalid name_offset:4194304 09:58:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001c40)={r0}) getsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000001c80), &(0x7f0000001cc0)=0x4) writev(r2, &(0x7f0000001bc0)=[{&(0x7f00000008c0)="c58aaa6eae2e7a62feabac2b2b3dd97850710cb54dd0ac433a36b202324435801b168483fcc4dcdac437906666fd7f41558d830c733f9c11713a781780654591ea929a1e0f7f4185a15d77c1172f0495b9b9e49dd0fc859232dde5002f5ba0d0ebf26bd9622ce98a057e27d58711f54b620fa565a46324ca0d835f4227242accbb34c091737a", 0x86}, {&(0x7f0000000980)="b00afb0dd0554850e0d37a8375b8ddc2e121be0b6281d9cdee82ecd29932589a1278db57426eeb5e0573c8f85ef0d4a25ba04cfcd4fc945d208fab3b166a5af10e46510057588f7f70a1165d5c155308a88066c26930", 0x56}, {&(0x7f0000000a00)="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", 0x1000}, {&(0x7f0000001a00)="f6fb98ad00d395e2b9cfbf9a8f3af3e9b6b8bf082853efb1b880470623e5db0f58bea555a77d35b4e27126ad04e7f403c95a27c739dabbd7c3b11449a230bbcba9011dd7e62cdadae3f0475cf5a8c87e45501a6f8d696691e97a80196e33ac0f6576f6e6ccc62b5bc5deb70e242593af2769dd80e4eda48010aabd2e49bd8964ac1eaa5793d8469cc98a9bdb1906beaf6c7d3a36009528f1aab2f1d3d55653e3b1b1a95010", 0xa5}, {&(0x7f0000001ac0)="28c973c5b542f5acaa7a67b636230fb46852ae91e7711f67516e377b68071cbc46cc9f5d7ca35c8b3fe77939c0b1e9b3e4394fc34d78456d5d52494a180ac4a568aabc617f10a96d0a87c3da7863eb07f8d636c04d4c936126f90b5293264c6bce9117d51f67c8969ff271d8b29367c8fb7233056ef8e4007c64339391307b271103e3a8ab4fc2cd000f8224ae62258a5925f013263e505f1b0846523ab63ecdfb0663113dda14c5eb84f17086c5a265315e8e9022b69189049a325e2959fc2c140b22adb7bfebf106998664938dbf23ee9b8472c64be680ae2fbef883e03734829f80f4655524fbead264", 0xeb}], 0x5) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) sendmsg$rds(r1, &(0x7f0000000800)={&(0x7f0000000000)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/211, 0xd3}, {&(0x7f00000001c0)=""/18, 0x12}], 0x2, &(0x7f0000003040)=[@mask_cswp={0x58, 0x114, 0x9, {{0x0, 0x9}, &(0x7f0000000240)=0x8, &(0x7f0000000280)=0xff, 0x400, 0x80000001, 0xc9, 0x1, 0x8, 0xfffffffffffffff8}}, @cswp={0x58, 0x114, 0x7, {{0x6, 0xc3d}, &(0x7f00000002c0)=0x401, &(0x7f0000000300)=0x7, 0x0, 0x7, 0x3, 0x80000001, 0x49, 0x6}}, @rdma_args={0x48, 0x114, 0x1, {{0xf56, 0x2}, {&(0x7f0000001e40)=""/4096, 0x1000}, &(0x7f0000003000)=[{&(0x7f0000002e40)=""/221, 0xdd}, {&(0x7f0000002f40)=""/162, 0xa2}], 0x2, 0x20, 0x36}}, @mask_cswp={0x58, 0x114, 0x9, {{0x5, 0x3269ea76}, &(0x7f0000000340)=0x299, &(0x7f0000000380)=0x3, 0x20, 0xffffffffffffffe1, 0x4, 0xac3, 0x1, 0x8000}}, @mask_cswp={0x58, 0x114, 0x9, {{0x6, 0x1f}, &(0x7f00000003c0)=0x81, &(0x7f0000000440)=0xda770000000, 0x7fffffff, 0x6, 0x475c, 0xa74d, 0xa, 0x3}}, @mask_fadd={0x58, 0x114, 0x8, {{0x1, 0x10000000}, &(0x7f0000000480)=0x32, &(0x7f00000004c0)=0x4, 0x3, 0x0, 0x9, 0x1, 0x0, 0x6}}], 0x200}, 0x8000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r4, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r4, 0x6628, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000500)=0x14) [ 2897.659628][ T5079] BPF:[1] Invalid name_offset:4194304 [ 2897.669194][ T5080] BPF:Unsupported btf_header [ 2897.689545][ T5082] BPF:Unsupported btf_header 09:58:17 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x80ffff}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2897.737556][ T5081] BPF:[1] FUNC_PROTO (anon) [ 2897.754659][ T5081] BPF:return=0 args=( [ 2897.754900][ T5085] BPF:Unsupported flags [ 2897.792932][ T5089] BPF:Unsupported flags [ 2897.811145][ T5081] BPF:28 (anon) [ 2897.814884][ T5081] BPF:, 4 (invalid-name-offset) [ 2897.847539][ T5081] BPF:) [ 2897.860737][ T5081] BPF: [ 2897.875348][ T5081] BPF:Invalid arg#1 [ 2897.888213][ T5094] BPF:[1] Invalid name_offset:8454143 [ 2897.889283][ T5081] BPF: [ 2897.889283][ T5081] [ 2897.924247][ T5087] BPF:[1] FUNC_PROTO (anon) [ 2897.931496][ T5087] BPF:return=0 args=( [ 2897.934984][ T5097] BPF:[1] Invalid name_offset:8454143 [ 2897.939283][ T5087] BPF:28 (anon) [ 2897.946896][ T5087] BPF:, 4 (invalid-name-offset) [ 2897.963643][ T5087] BPF:) [ 2897.967734][ T5087] BPF: [ 2897.974620][ T5087] BPF:Invalid arg#1 [ 2897.988138][ T5087] BPF: [ 2897.988138][ T5087] [ 2897.996887][ T5057] BPF:[1] ENUM (anon) [ 2898.027060][ T5057] BPF:size=4 vlen=1 [ 2898.043618][ T5057] BPF: [ 2898.046548][ T5057] BPF:Invalid name [ 2898.067305][ T5057] BPF: [ 2898.067305][ T5057] 09:58:18 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b00718b1e2b5c9b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) 09:58:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x2e, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0xffffff}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:18 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x1e}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2898.190386][ T5107] BPF:[1] Invalid name_offset:16777215 [ 2898.194826][ T5108] BPF:Unsupported flags [ 2898.200816][ T5106] BPF:btf_header not found [ 2898.202499][ T5109] BPF:[1] Invalid name_offset:16777215 [ 2898.222137][ T5105] BPF:[1] FUNC_PROTO (anon) [ 2898.226934][ T5110] BPF:btf_header not found [ 2898.227043][ T5105] BPF:return=0 args=( 09:58:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x1000000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2898.236798][ T5111] BPF:Unsupported flags [ 2898.246802][ T5105] BPF:30 (anon) [ 2898.258202][ T5105] BPF:, 4 (invalid-name-offset) [ 2898.274317][ T5105] BPF:) [ 2898.281765][ T5105] BPF: 09:58:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2898.311725][ T5105] BPF:Invalid arg#1 [ 2898.323565][ T5105] BPF: [ 2898.323565][ T5105] [ 2898.349785][ T5115] BPF:[1] FUNC_PROTO (anon) [ 2898.394555][ T5115] BPF:return=0 args=( [ 2898.406622][ T5118] BPF:[1] Invalid name_offset:16777216 [ 2898.417463][ T5115] BPF:30 (anon) [ 2898.429596][ T5115] BPF:, 4 (invalid-name-offset) [ 2898.440484][ T5122] BPF:[1] ENUM (anon) [ 2898.444900][ T5123] BPF:[1] Invalid name_offset:16777216 [ 2898.447211][ T5115] BPF:) [ 2898.464951][ T5122] BPF:size=4 vlen=1 [ 2898.470046][ T5124] BPF:btf_header not found [ 2898.476847][ T5122] BPF: [ 2898.478217][ T5115] BPF: [ 2898.484871][ T5125] BPF:Unsupported flags 09:58:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x2000000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2898.495505][ T5126] BPF:btf_header not found [ 2898.502016][ T5115] BPF:Invalid arg#1 [ 2898.502773][ T5127] BPF:Unsupported flags [ 2898.510179][ T5122] BPF:Invalid name [ 2898.511649][ T5115] BPF: [ 2898.511649][ T5115] [ 2898.519121][ T5122] BPF: [ 2898.519121][ T5122] [ 2898.528641][ T5128] BPF:[1] ENUM (anon) 09:58:18 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x48}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2898.558159][ T5128] BPF:size=4 vlen=1 [ 2898.602690][ T5128] BPF: [ 2898.605612][ T5128] BPF:Invalid name [ 2898.621256][ T5128] BPF: [ 2898.621256][ T5128] [ 2898.671774][ T5134] BPF:[1] Invalid name_offset:33554432 [ 2898.702552][ T5137] BPF:[1] Invalid name_offset:33554432 09:58:18 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000140)=0x10000, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair(0x8, 0x800, 0x4, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r3, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r3, 0x6628, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000cc0)='cpuacct.usage_all\x00', 0x0, 0x0) getsockopt$inet_opts(r4, 0x0, 0x4, &(0x7f0000000d00)=""/15, &(0x7f0000000d40)=0xf) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") getsockopt$inet_mreqn(r5, 0x0, 0xd0a6b833f5c91723, &(0x7f0000000000)={@broadcast, @multicast1}, &(0x7f0000000180)=0xc) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r6, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") writev(r6, &(0x7f0000000680)=[{&(0x7f0000000300)="b77e35c365557d1caebeb4f2cd43b7615810e250d78987c1de22a52af8847b6ac53c59a7fd4be9c78159d294bb7eb5cff78519870e9a4a0668053e8db23f6718a064e26a8d8c335a6e332627dfa6494cc410a4f90c07ca9154afce1405afcadda495cc82e0f64e164ace1843697558cb77a4e14d94b01106b446c8ca764e8885fab235f25fae5f3b150ba0edd2b2bdb22fce7897a78e126b12f7bbaff6fb17e4c2ee59015652e40f0e07a56945b6d8c3be60b2ee59302b2df7340928549952176442a3fddc06fae94482268a4ba03d", 0xcf}, {&(0x7f0000000440)="a100f36e548f7c9879ba95ce827693ebd380d71cd6d36524fa9e43e51533d40dc91a826dfc96aed3f96625e4a1a4d09ebcc4c6c014991dd598414cc0efc7c4f064a039b3868e3a761e0fe67a11336296ada3908c0bd363417f23a6ff62878abaa1378c0768d75f3363ec6f925e4b2fc627d5b8dd129874905b221c608e2158e4615b5481fe449c2100ba36689335ce5906235103335c79", 0x97}, {&(0x7f0000000500)="437f4f3dc119d03912cdd34206a99c0a606b45333964ae17e3574c3db8bf0209973bdc9c16c1582cb5c79db067899b1a2e015082d9ae480595854e260928bf0c9f8159f7c2d77684f115f13c0693fcef0b40ec6749b1589948aace172e8f6e8ad46a616ef6feb82dbf8de0846d8016e33ec0c14d3c02cb0c10072f6ecce2cb51ca8c9fa14577a861f3b9c33c58355ee824f5b78362f24bcb1a733d123043699494a87d348a6d5657b82faa5f68c7067aed8233144422f1c82dfdb288dc12bd0591a5eb0a8d7111552c7f947d237bb0", 0xcf}, {&(0x7f0000000600)="7355bba5286b3f6809b91aa5bede35a50a42266260fb2cb962c8d807c0a5fe3230459f8da8c7b1d19dad035013cefdedcaec45b0aaddacd9c4127e1f8f1054beea15791bc1cd84fc95559bd93d5888163b3cb952ecbdb12d5db442f64cb449fe53", 0x61}, {&(0x7f0000000800)="2be6b8e9210ce48db17ac0784d14927ea8540c6016a3d6d83cc5bb695efe8c8f5a567b402b3c0a1fd76564640c630c2affed4959b1835ef75ae5d85df05b202cf118dc1ec9f5900d6de996fb72f11cb599739a237241668891c24ce170618f9f79ffb4d8c9d243fe9fa49efdb876e414e1a5fc45a134463a6cbd2ee7c0e2762e6b335eb319eee28e51521a2b042cace623e437818c2e2055cd53d3131b7ff561f2e9710252faa21e19f45c7c95476285c0abd83cfeb78c130be4c3d649dbe0e22726bb41527f9e70480c66eef9f436042de27a3760d824225ffa490f202d83f2543a6ab8ad2853fe43360fb64674d01a524dd4edd3f489ffc6", 0xf9}, {&(0x7f0000000900)="616a02e027a49bc4c6d2459e196915d71fab6161548067b72dbd2de548e7e354ad1b6e99a1fa5840bc9008eea880440ba620185dc86c234f8232e6a72938d1aa9845c7ba41e244969769426000f220b4f9061c7958a7e079cf317f2b279cebe67d4b9f64ba2ff8e9497c6a25943143a6d8333905236a14a515cf6540edabe58a6401273cad2950cb5dd0c4b5c441288f56b6e12f5b2ac03e37866ef8728f12db79412e78f233ec67f05810eca697df73b461f79ec3e6a2353fab3000063ee914fff73aad51da1f154e2ffbf6a8a08c410bd448373adf5565a0ba47a4eb368f99033e1728cd5b", 0xe6}, {&(0x7f0000000a00)="3ceae127f09f351aae9f954880baff36d1a30475a997820c021af88592b5dea6ee9a47defb53f42987cd63db545dfd8c9fd90543189b451dbf39092905520465310e41b446d4ae40f3cc19774ed31d523baf98fefc3f2e20203bd92a4d69b8a41e0b23ffb24e0ce65198b478f310a24bd9608f1549f07431f900485f11900186b3bf30a6e81538fb10c947b9c6900f8c1f55a7eb509aa2a465c2935c9faa3fe220ef3da6520ff1ed702c262af782014ebbc71f9a9c9e18ea76e3d248374989", 0xbf}, {&(0x7f0000000ac0)="dce2088a85cc96f6c8eb8d565fa856e0a2aff37950d54400709d77be6b0883a9d0a5a43ba28ae30c1b534d20c149956968b4d6884c238203b36a98926f54824998f6056294c6af243a0d04dd6c5be091b835fa04bbb40f0f917eb9830cf9d8efbdf8d2252cca6e87daa45dcfb4963302a52ba1d29cd00a6af4899796b07c2a102211a907943a54c467eba33cb2dd89536d3bfd55", 0x94}], 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000b80)=ANY=[@ANYBLOB="9feb05001800ffffffdb020000006f2e5f00"/29], &(0x7f0000000700)=""/220, 0xe, 0xdc, 0xa}, 0x20) pwritev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000200)="0080ee2c71c8c7187577fca736b52b6e096e8e196a911cc811ba51971f07ef3b7928b118bbb2f3bc79cdef08d16cfab1f8e476a0dc137c75d3f29a51830e4a24dab11cd33b6ec3977b8a2fa0a3b220ba44a3197e910e4a2da9dc66de0304b15edd2bd6caf5c27bbb2809e1dcd5f527176ef96bcec46ccd384f156eb81cacaed27720efc3b82ad9f5fbe2e7", 0x8b}, {&(0x7f00000002c0)="1cd8b4c4", 0x4}, {&(0x7f0000000bc0)="9129ab46b8e2dd711841a4d4dffc366bc4cffb59a1430ad2527c92c2cbd0fceec86b7a5eda326fa47b582da10de03d52e8abaf9c6591c087bde9c021dddee12b4775fccd24dec236454c0e14b61045764e95bb9293713ed0599c84591acb2eefcef44d4dec387cb6218320ba152e5987502c0dfb665e7c61fe96ecd86939934a7decc6cbc384e2f9cf69a3611a10d9f3cb203211012f83901f504f4c0a2a37cc7ae399a48e06eb189bb4b47788f403c032ba67c56e953fb646a2a6c385f1fff32aab6ae98a7b1d10d0d94ab2c7a4683a592de4ca47f55055e6d7f99626b50a92899f5dc4", 0xe4}], 0x3, 0x0) 09:58:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x30, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:18 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000000)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000500001400000014000000020604000000000000000000000000000000000000000000000068771f0d7b49f1f7ad19035623721a8beea0f26982052d8f0707d63aff2146c8a091be74f422a984e4df247335f1a437e82d79ccb4f6417127473bf052ba95430d408093eb"], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2898.738605][ T5136] BPF:[1] FUNC_PROTO (anon) [ 2898.751189][ T5136] BPF:return=0 args=( [ 2898.755237][ T5136] BPF:72 (anon) [ 2898.758700][ T5136] BPF:, 4 (invalid-name-offset) 09:58:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x4000000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2898.805463][ T5143] BPF:Unsupported flags [ 2898.807728][ T5136] BPF:) [ 2898.813287][ T5144] BPF:btf_header not found [ 2898.822336][ T5136] BPF: [ 2898.822751][ T5145] BPF:Unsupported flags [ 2898.825275][ T5136] BPF:Invalid arg#1 [ 2898.830636][ T5142] BPF:Unsupported section found [ 2898.840218][ T5136] BPF: [ 2898.840218][ T5136] [ 2898.861560][ T5148] BPF:btf_header not found [ 2898.875889][ T5149] BPF:[1] FUNC_PROTO (anon) [ 2898.896071][ T5149] BPF:return=0 args=( [ 2898.903982][ T5151] BPF:[1] Invalid name_offset:67108864 09:58:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:18 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000002c0), 0xfefe) sendfile(r4, r5, &(0x7f0000000000), 0xffe) syz_emit_ethernet(0x1016, &(0x7f0000000800)=ANY=[@ANYBLOB="9ee6646b3be40000000000000011fe01a60075135cb2351670aedb5e40e8c4f320de3dc4c6aaf7ff446ec856e623197e81556be3bf97e86011d8ac99f71d916cb3e3b266d5b2a65e00de2f4cbcf27d7c0bf841625652f1ae7599c61271296d3ef2218bc7380b47c4d5617ed2840a26c016f5e09f23ccd0b15a49829e6f7f5d37b5f2d692865a0bf9b00cced5e849b40c4262dbbc9efbd12c372ae8bad094096c787f37bc8ea5cd36c270833d39bd3fbc4bbd46ba91d13b05555c6070a4aac8122251bc2aa9ce9dc184d08a880c92b7755d6ae4961a28d23a49a5b76bd7a421e0b7b44f16a63ac500efcd72f11bce9030e07b9f2ab6fd7a4e8205ce8c54727b76fde20e10a19892582d96d67cddc0cff176d9b69c10650dd41450eee8de8546a40892e58cb49f966bfa3a660464d9e20cde78ea4de26bcfde28b40ebc864f7baad5fe8392328e96ea64e0e2c09c4e186a9785a5c9d68f908c6b871bd31b2fe48a762e49f470e745bcb39dbbeb840588c4ffe78a7a79ac7b91037f36106b0b7d86a2920943ccd368faa5570a09269b73529a296829379fbf8401e503f645838568ae0a9d0cd55ec8cc11d258f246c33201c68c88b5005e7498a37c141d2a7750b95495378d790a00eb6496926abe3ef8b70a1ddc7f51b02e633ce769eacc87e610db0fc89e9b9750921440efab76c660d23a856f69c0032631b3083c6c47f56241d45e99b6e7622997cec32a65343273fc219354808fab1790c310af0c208c066feec2ab7c816544da024914247f777ce58b6cfd2171a284007df0e89ece24a5b912c6d3d2aa2809a36cf9ee720faf0758fadf1bb02e48111b31d190ac00f0a08af38d90e7fee33647bc508890e73c7ff306ceb7c5d9a6feb56a8efbfbd348f8a8a23cac502570acbfffccd61c34858affdc0d76c8dab5347ad352f10227b80826364d8f3edbddfdbf623031bfe8c3009161f06cf45ec70d3d65d8e4ca1bb30224225154c1c147224afa224f9927513766af34355a594abb5a34e63502e91b76adaae1b063da5daadf700bbc523481942973b7cb66996cc488bdfdfbc03f8032d9517141fd0f8d39e9a13645762986b2adfe1a192b8722677ff32f34ce10fc44954edebefd4f2d6d9c604e99bc9ed80264d9d359c5a454a08e80b9b5ebc9a1573499da83a35b36a274cdefe1036d5e548634b2f189cf25768ba93b8642e58b26053b08f0bc49c0a13eb2084d6d6ccfe21763a92aa04d0cb74a98ab3866152de08785eb5b6b656f11f8f0d1935fd5b654d7208d8a8ebcf44ed4730e885c6caf2f5ffd60a0a857719f995bb6128e503f229facdc1766ce6b6a69477d044deecd4e76c0aae5dddba383c0da20c368d0a478010caccccd6e3cd926c93032baa5a4d7d9f8b877012ec24561b23fef5b9d5c6e10d7130be70299e1abc4740102d6baea423310c3a1c46139d65b15f041847281f866da26415c8326dd66b5546fee7940064335a79235870dcc168699f20c08b44fb32b5e0fae7d90aa84ca39664385e8dd74a171f45df4e7b5cf6f652cb12a7391b9094343a78267567c0a5c28f9cf9f29e5ce68d8ecf9bc444fd3a0ba75588848988f897f686050644f62156ef9733ed0d90e25ac0692e6b994acd0b7de92136bf4830ccc0eea708ee9d87061847b6f679ef45f35b6c598bace6180980c74082a3f1811cff1688dd16aeb62137ef1c9162d3cc4154904b326b9d00deb896ec054457770be83d959ee4fd61c96b1c84c1a3eb8fdf13e1afbd8f2a04d67402fa3b4e76f8152b6623c18b3a3411714a583a55e6651e7c5005944dbf633eac6d64b4b33a0042269d29f9fae3fe00cf58696a34aba9ce8897ece20ffb54e7cc125dfef3a789001ddf0e242b24b88820e82b65e31638e386c585c01b5411d6de7d7ae5c9440070a61227da4b2ca2fa5ace303c503fb0653d1e16b088dc18185afac7d9e43fef9effb5479b07384a1b1b6baedd726578dd8acd5fdb1b3e91eb346fbd817a332d4c900a62166734997995836c6ac4577276803b15e3e7ecadcddc0d901a3198f7d2f5a2c5142f555a46623327944322fd55a8f92a73fd9b758cfe261082dbf57dc1122014f4bd2f23623196af6463fa0e2d52e95d249bfe236f24c05a06da8c846bae68cef6fe77afdb916708fa1148817d8c355fb98cec63292563645308175cc20522f6aa0c1e04322b7144c0cf6197ddfc6ed927ac071a8b0b06d88a25017880a2462a598513270f32098ffd8a7b27abec322529482a2a726df7d938d713c4b91d14e032076b743f327d11ae26c58e1cc6c9af8d8baa30bb4172ddc6a9f293d63d7f7bfd1bee1316ffeefb2c1d4eb912e7708208f370c76aeba6b09a10284663b553d80817bec4f61392fd94cb9142631bee85cf0d6d97549c3cbc880b589bacfea6b07db48daf3d6ad6002e77182686a291671a015960f19beab7a12d4bbae3dbae0f7f6a1ee2552432131e23ce504e2a408bbe3f7a2aa15b62cd5eaca4c6df0bf9e23bb222f44ba6dbb6d3e6108fefd807f47bed06713092d1f9aceb9255709405126658331dab084204c726c458b162506562470cfcbcc917869928366d701b91fdbe250dd075a79fd87c65b4d09c624203b97389f99b023c44ce64828043021003a0638c4b9bbcc6322f1f4c32311922b92df16aaa10ac9731d4d82717a4b9e0c39a6189aaf003aadd127243b12c7e2a518bf870d5df294dedeed3964ec6e1f5a4bd3dbbf8f853071c93b0490bdd394b23f35c299593738e78b6d8cc01f88543c8d0fba067e212dc791cb7cbcdd8cb05673959dca5fa2822bff45e56b7263bfa2c6e424b748c5d3ac83a16962935b13b891aadfbfa26c4d1b39d51410ae0589c56f2e2d8f3c024b7cd91b62f1b470a21edca286fe0d05946f5f87cedf385829d1c13d1375ce363ba663ccfd8e7fe69be790001ddc01bd128c4e0cca4957ad1774512816a7f3e53688bea832663c05968b699bc487cf545f196b308fa208f053138f22123559b020b266616f5f00c8861c9809cd6a5710f21293a467c1e47640fccc54bf5acc591f167f1367005140383086f918c14b5f6dc250213eac463629873e6af1f7007e8b94b786a0b423b09172eece7582e66f02c4fe3b7750228e2197d3b5ec068c810952caf7c56e8c8c224c1547b2c6ba954f093131f4b91fb48470273276cf395e9235ecd3317799ea6cdf31fdf19b650230dd4d8526cf9ee99993390d962f20db9b2668f2ea3b426dede5b54608a3d800ce13fd8fa51dc09fdba9fa257c7ad4ba669656d009364a616e9b72d7d4228f8de2b6b83788accc3ac792de31ef432e44de446e8af1ce2cfbb6d25748cbc0bca9110c7289f5a057fca4ba468bca09423c0fcd57cc388d9f886f9ad1608a253f87cfba801f86c6694119ad821c3ba71bdb313f8500e9f3d7097c96203d248a265ed288a8037a3e010a601413d7d6201bc45df589ac6f48736a57651e76098ba72443d87affaea5e444b1cb7827922f3eb3d225b6f3ff9b61b4bab476e95f8e1156f426a04d6940ba2a985cf32de261c7f4432030566d0780025a9c2fae3fd4c2ce3c702226381ee5b944b8b20dbd81219674fa195216e3a2329bd8c8fca7f06659c32794f5b30ac396a97af4704c86c505c75fde794b82a971f54f5957efdc1d57e665dc3c3c7c9a0903357f978e1ce863396557229a1c08dff3583dbef191af7c601819839ba0d3b5c1260185d707c30726ea28d57aaa10f91b805ccd8ad80ed6ac6f5425ac70e5c95a31d7e5d6585c7a2d33877eae06ad0429aaad9ff83c642e677f4b504941a1ee7dcebf37e418705de69131db69b7449896c9b0d85fa6747bddc826184e7838c67ee68831ac623cc7d7a939e95faf6e6b604ad54592e93f30c565c91db4e312a2b0860835442ce8306c743a074dba81f35b1f550bef2dc135b794426f03b33daa89980721a640534e62f3f6c3da5bce762b3386288fa4f0245a733690a33872c4c96e8eb50233716fac8d1f59643f96e6e3bec2a636071c140ff990d3326b372de11d81b567283aaf8cd2380db3d56607e835337133f31f194087eb7df13805a1732c66d3ed126c4ba3c90b04bfdd0dc19a766c0928b007921b2379cdf23b49eba315a5d8475e93746c03405e5cf6d25464cd08ac0765e53e31e66b0f2a7a41749708dc9ce327814272d6093d1f753d57c1d5168af8a1c28169591a277bc0b4e952dc547ae1a1e2844835955ea6ee00a76050471357ebea0c8257c9c0b0c8f18819e36610ecaec570704b65b3118bed8e39d1c32cc06a8abab91577b5464ec4e1086ef72c2c0bf11f2b4140b2b8761d9410a80f10ac4d649726ddf3a568bf9f7f42a35a1957ce57c2491066352c05ed2c784058ed44138966954cda889a1e6a2e42d7eca408fefc5f354050fddab36d91ca11ccc08a29f7761faff8702b998faabf9b42f1f2558a93135ada0160946aa1793c280dc3536b307337bebe0e8274b63b8fe7b98fedb5cff2f99cc5509cad3f3ae2ae94b464b679da493f7cdaf600d58ae46496c8efc81fa48809052b335a34cdd4c6cd2e93a3e15b8c59a4ddf32afe7ec25aee91bca9e86c912e94d18bbacf69aeaade53f0778ff39d5a42cf8bb75bd838351d6bb366183f09d677c75dcc1b32c7825f4c50dc2cefbc9baff4b27a6a5df909a84430c8704bebf0e06c8be75aaab84656d2a087cfe751598f2af03d9b7b98d9bc73e8153b4160c75255d62a00ca18e9ed0296fe1d28132e1a193ea79db280759c192c44f6dad05428421b11c64e98e3dcd2ca33b3f478b054b1185ef72ad1327201de77596a1672d2ccfa10badd46c4d295e379e4064aeb7d3ad359340f07f12b4135c317bd929122fea5695875fe361ec1ac02c4c983cccf3188ca8e5cbc9815bdee13424b1256f35240fde90bbe55988ae80809a78f06fa3d31d4ce6133a8b4df9bde47aa66901882ebb4c575ebcb839e994ec40ce65f21d01b775de50f86f13de665e49233fbb638a1e01c28e0e43c8251f297feaa1801f208d164230e646686cd934e03f9f9ba24310a3b407383024a06b231ca65126ca120743937ff3328f7b525cf047db0ff7d2b989eecc3ab30a85df597930a20771a465e44e33028d59bc8076e688ec63fa506cde06f75ad3607a4e6fe0b51859b7607fc193445c50fe7c4e95ef5352a68caceac6f9f3ae2dfc065759e375dbbdb926b7a535e385f1ba0eda5c2f56c7f178227ffd17468f5363fcb9c5964981a2b4169d4ab2f62a23e1cbd0c37051981a6839f1a95a0297d233fb56533f24483828ce1ebbd844eaf48ed147b1c638191678fa8d24d0a8a416c074bcb527e69259f9bf7a2f0545ca55b70546840bea9acb0be7d5bb23f93a43b56f35f3f2dd1afd5ad39776a008d77ad2c4a71962008b044344d3d9f39eadc92f92aafeedb5c9ed7ad4f3089fd9a6215bef3ef1ec3f8fae4f85bf0dee7e2de86186e44186d5fbf7f8b358671d721e017e40f7534a16a82e8d5e761910b668f752678f4f72a033dbaf220712ad9791ef267cf1532e9fc32f2265d62a7d27b9b98af6f93d1af4ec45558086a280779f656c8d5a1b6fefeaf10b2bd6b446b482562b29f0aced52387995629c5b152ea040f6283c17629b8c05d47532f2244123e7409507100afb56d32bee2964466d29b7e01b70fd04964174f7c9d9cc9034921452b66f982664efecc3ae8dce255fcb582a1cb6289e4108c2345044f17ee8b7b6607721931c38a78dd38880bb86ed8a9622a6a36ab5184c40116aa22832956250195355318262602ed76081b9fd2e1"], 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r6, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYRESOCT=r0, @ANYRESDEC=0x0, @ANYRES64, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRES32=r1, @ANYRESHEX=0x0], @ANYRESDEC=r2, @ANYRESHEX, @ANYRES32=0x0, @ANYRES64=r6], &(0x7f0000000700)=""/204, 0x6d, 0xcc, 0x8}, 0x20) 09:58:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x34, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2898.924931][ T5152] BPF:[1] Invalid name_offset:67108864 [ 2898.928916][ T5149] BPF:72 (anon) [ 2898.963411][ T5149] BPF:, 4 (invalid-name-offset) 09:58:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x8000000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2899.010356][ T5149] BPF:) [ 2899.030120][ T5149] BPF: [ 2899.058326][ T5149] BPF:Invalid arg#1 [ 2899.082147][ T5149] BPF: [ 2899.082147][ T5149] [ 2899.093362][ T5160] BPF:Unsupported flags 09:58:19 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x4c}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2899.124286][ T5166] BPF:Unsupported flags [ 2899.128619][ T5165] BPF:btf_header not found [ 2899.161510][ T5167] BPF:btf_header not found [ 2899.169610][ T5169] BPF:btf_header not found 09:58:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x12, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2899.189255][ T5168] BPF:[1] Invalid name_offset:134217728 [ 2899.203265][ T5173] BPF:btf_header not found [ 2899.232741][ T5175] BPF:[1] Invalid name_offset:134217728 09:58:19 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x7f}, 0x1) [ 2899.276358][ T5177] BPF:[1] FUNC_PROTO (anon) [ 2899.297103][ T5177] BPF:return=0 args=( [ 2899.325840][ T5180] BPF:Unsupported flags [ 2899.335734][ T5177] BPF:76 (anon) [ 2899.361026][ T5177] BPF:, 4 (invalid-name-offset) [ 2899.370727][ T5183] BPF:Unsupported flags [ 2899.406860][ T5185] BPF:[1] ENUM (anon) [ 2899.437110][ T5177] BPF:) [ 2899.440004][ T5177] BPF: [ 2899.443317][ T5185] BPF:size=4 vlen=1 [ 2899.448322][ T5177] BPF:Invalid arg#1 [ 2899.467609][ T5185] BPF: [ 2899.487188][ T5177] BPF: [ 2899.487188][ T5177] [ 2899.493866][ T5185] BPF:Invalid name [ 2899.498112][ T5185] BPF: [ 2899.498112][ T5185] [ 2899.511587][ T5188] BPF:[1] FUNC_PROTO (anon) [ 2899.516315][ T5188] BPF:return=0 args=( [ 2899.520381][ T5188] BPF:76 (anon) [ 2899.531033][ T5188] BPF:, 4 (invalid-name-offset) [ 2899.536035][ T5188] BPF:) [ 2899.545811][ T5188] BPF: [ 2899.548707][ T5188] BPF:Invalid arg#1 [ 2899.560023][ T5188] BPF: [ 2899.560023][ T5188] 09:58:19 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) 09:58:19 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x10000000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:19 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x36, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:19 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x60}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2899.895140][ T5194] BPF:[1] Invalid name_offset:268435456 [ 2899.904757][ T5185] BPF:[1] ENUM (anon) [ 2899.911506][ T5196] BPF:[1] FUNC_PROTO (anon) [ 2899.916567][ T5185] BPF:size=4 vlen=1 [ 2899.920812][ T5195] BPF:btf_header not found [ 2899.920816][ T5196] BPF:return=0 args=( [ 2899.920827][ T5196] BPF:96 (anon) [ 2899.933428][ T5197] BPF:Unsupported flags [ 2899.933486][ T5185] BPF: [ 2899.940695][ T5185] BPF:Invalid name 09:58:19 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x12000000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2899.944981][ T5198] BPF:[1] Invalid name_offset:268435456 [ 2899.949071][ T5199] BPF:Unsupported flags [ 2899.951590][ T5196] BPF:, 4 (invalid-name-offset) [ 2899.962442][ T5200] BPF:btf_header not found [ 2899.971912][ T5185] BPF: [ 2899.971912][ T5185] [ 2899.976968][ T5196] BPF:) [ 2899.981406][ T5196] BPF: [ 2899.986622][ T5196] BPF:Invalid arg#1 09:58:19 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x5, &(0x7f0000000040)="e6090000000000007b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000a2e223a36b312c057ab4e973000000000014000000140000000200000000000000010000060400"], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2899.994929][ T5196] BPF: [ 2899.994929][ T5196] [ 2900.009585][ T5202] BPF:[1] FUNC_PROTO (anon) [ 2900.033389][ T5202] BPF:return=0 args=( 09:58:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x63, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2900.045046][ T5202] BPF:96 (anon) [ 2900.074824][ T5202] BPF:, 4 (invalid-name-offset) 09:58:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2900.102476][ T5202] BPF:) [ 2900.108396][ T5202] BPF: [ 2900.116018][ T5202] BPF:Invalid arg#1 [ 2900.150995][ T5202] BPF: [ 2900.150995][ T5202] [ 2900.160806][ T5206] BPF:[1] Invalid name_offset:301989888 09:58:20 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x68}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2900.206350][ T5209] BPF:[1] Invalid name_offset:301989888 [ 2900.224529][ T5210] BPF:btf_header not found [ 2900.246100][ T5212] BPF:btf_header not found 09:58:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x3e4, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:20 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x34030000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2900.326200][ T5217] BPF:Unsupported flags [ 2900.338333][ T5216] BPF:[1] DATASEC (anon) [ 2900.354319][ T5216] BPF:size=0 vlen=6 [ 2900.356980][ T5219] BPF:Unsupported flags [ 2900.386291][ T5216] BPF: [ 2900.389237][ T5216] BPF:size == 0 [ 2900.401259][ T5216] BPF: [ 2900.401259][ T5216] [ 2900.424138][ T5222] BPF:[1] FUNC_PROTO (anon) [ 2900.429362][ T5225] BPF:[1] DATASEC (anon) [ 2900.443494][ T5228] BPF:btf_header not found [ 2900.450806][ T5225] BPF:size=0 vlen=6 [ 2900.460623][ T5230] BPF:btf_header not found [ 2900.471119][ T5225] BPF: [ 2900.474056][ T5225] BPF:size == 0 [ 2900.478305][ T5225] BPF: [ 2900.478305][ T5225] [ 2900.484522][ T5222] BPF:return=0 args=( [ 2900.498946][ T5231] BPF:[1] Invalid name_offset:872611840 [ 2900.516954][ T5222] BPF:104 (anon) [ 2900.523795][ T5232] BPF:btf_header not found [ 2900.537448][ T5233] BPF:[1] Invalid name_offset:872611840 09:58:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000000f00000000000080692d8e61719aaf7da878f79f7d923ba539711d524f0a606f435f8fe3f43d5358568ce828db5f8d5c5b1bc67c1e3ad360eb6b4e7dff9b6f7f3aac8220c64953d614bf0f127f217964fa116667d4d93e3bb22e7bae29c81a3a3500e3fea1aa6a21d3708210b1e89f299d8bc2a50112cfee5ccd"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:58:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x60, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2900.549878][ T5235] BPF:btf_header not found [ 2900.565474][ T5222] BPF:, 4 (invalid-name-offset) [ 2900.570691][ T5222] BPF:) [ 2900.578413][ T5222] BPF: 09:58:20 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r2 = accept(r1, 0x0, &(0x7f0000000000)) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000480)={r5}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000000c0)={r5, @in6={{0xa, 0x4e24, 0x8000, @remote, 0xb979}}}, 0x84) [ 2900.608325][ T5222] BPF:Invalid arg#1 [ 2900.623511][ T5222] BPF: [ 2900.623511][ T5222] [ 2900.643971][ T5238] BPF:Unsupported flags 09:58:20 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x40000000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2900.661754][ T5242] BPF:[1] FUNC_PROTO (anon) [ 2900.706714][ T5245] BPF:btf_header not found [ 2900.712394][ T5246] BPF:Unsupported flags [ 2900.716579][ T5247] BPF:[1] DATASEC (anon) [ 2900.739403][ T5242] BPF:return=0 args=( [ 2900.751276][ T5250] BPF:btf_header not found [ 2900.754062][ T5247] BPF:size=0 vlen=0 [ 2900.762463][ T5247] BPF: [ 2900.771524][ T5247] BPF:vlen == 0 [ 2900.775187][ T5242] BPF:104 (anon) [ 2900.778914][ T5247] BPF: [ 2900.778914][ T5247] [ 2900.783990][ T5242] BPF:, 4 (invalid-name-offset) [ 2900.789288][ T5242] BPF:) [ 2900.794434][ T5253] BPF:[1] DATASEC (anon) [ 2900.798978][ T5253] BPF:size=0 vlen=0 [ 2900.803538][ T5242] BPF: 09:58:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2900.806438][ T5251] BPF:[1] ENUM (anon) [ 2900.811202][ T5253] BPF: [ 2900.814110][ T5242] BPF:Invalid arg#1 [ 2900.815376][ T5252] BPF:[1] Invalid name_offset:1073741824 [ 2900.818055][ T5253] BPF:vlen == 0 [ 2900.827291][ T5251] BPF:size=4 vlen=1 [ 2900.831290][ T5242] BPF: [ 2900.831290][ T5242] [ 2900.836390][ T5253] BPF: [ 2900.836390][ T5253] [ 2900.857695][ T5251] BPF: [ 2900.874690][ T5257] BPF:[1] Invalid name_offset:1073741824 [ 2900.877454][ T5251] BPF:Invalid name 09:58:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010818000000004370b8e18f66e8a0b5098b32711c849b0000000c0000000c00030000000000000000000000000f0000000000402e612e00"], &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) syz_init_net_socket$x25(0x9, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$binfmt_script(r1, &(0x7f0000000180)={'#! ', './file0', [{0x20, '^ppp0GPLsystem)proc!'}], 0xa, "5896ca96b2807e4799e483c036bcc8055af511603903971f4c72c65e0cc3a0cf846e9c5002687261e5bce331f329458cae0b58439e1d1ce72ef910974f49de55fcef46e127abbad35142c5c68be79ed67225aa7c854bce4cb9fdeb38bc95e0f8f1bf04297ff6d942b35cc7554c87002d2d3c244eec3099720f2ed38ff2787269f7fb4488ed5ea52148d14749041fc79a65dadca059e800b426173fc14c5371e7e0709e1b47a4a049b8022a9ef2cef0c201d0"}, 0xd2) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x6628, 0x0) ioctl$SIOCX25SDTEFACILITIES(r2, 0x89eb, &(0x7f0000000000)={0x2, 0x6, 0x8001, 0x7, 0x3, 0x15, 0x9, "fb1b599c9df73700", "59f9255d11a074152b3663b490ba1c6be42f3708"}) 09:58:20 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x6c}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:20 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0xdb000000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2900.909470][ T5258] BPF:Unsupported flags [ 2900.926291][ T5251] BPF: [ 2900.926291][ T5251] [ 2900.940765][ T5259] BPF:Unsupported flags [ 2900.992930][ T5255] BPF:[1] ENUM (anon) [ 2901.027075][ T5266] BPF:[1] DATASEC (anon) [ 2901.035538][ T5255] BPF:size=4 vlen=1 09:58:21 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2901.068045][ T5255] BPF: [ 2901.075591][ T5266] BPF: [ 2901.078523][ T5266] BPF:meta_left:0 meta_needed:24 [ 2901.081941][ T5255] BPF:Invalid name [ 2901.087270][ T5270] BPF:Unsupported flags [ 2901.099225][ T5271] BPF:[1] FUNC_PROTO (anon) [ 2901.101260][ T5255] BPF: [ 2901.101260][ T5255] [ 2901.109448][ T5272] BPF:[1] Invalid name_offset:3674210304 [ 2901.115385][ T5266] BPF: [ 2901.115385][ T5266] [ 2901.136485][ T5271] BPF:return=0 args=( [ 2901.140518][ T5271] BPF:108 (anon) [ 2901.146832][ T5275] BPF:[1] DATASEC (anon) [ 2901.151608][ T5276] BPF:[1] Invalid name_offset:3674210304 09:58:21 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb0100180000cf2e117a5f3149cce3fc8ce6e77e45ca000000000014000000140000000200000000000000010000060400000000000000000000f96505297a6bac2785edf1a99af74e000000"], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2901.166280][ T5271] BPF:, 4 (invalid-name-offset) [ 2901.181633][ T5271] BPF:) [ 2901.187014][ T5271] BPF: [ 2901.195393][ T5275] BPF: [ 2901.196816][ T5278] BPF:Unsupported flags [ 2901.204378][ T5275] BPF:meta_left:0 meta_needed:24 09:58:21 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0xe4ffffff}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2901.218936][ T5271] BPF:Invalid arg#1 [ 2901.223187][ T5275] BPF: [ 2901.223187][ T5275] [ 2901.232669][ T5271] BPF: [ 2901.232669][ T5271] [ 2901.254839][ T5280] BPF:Unsupported flags 09:58:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2901.286164][ T5284] BPF:[1] FUNC_PROTO (anon) [ 2901.305515][ T5284] BPF:return=0 args=( [ 2901.307553][ T5283] BPF:[1] Invalid name_offset:3841982463 [ 2901.339342][ T5284] BPF:108 (anon) [ 2901.361271][ T5284] BPF:, 4 (invalid-name-offset) [ 2901.364068][ T5287] BPF:btf_header not found [ 2901.370817][ T5290] BPF:[1] Invalid name_offset:3841982463 [ 2901.373812][ T5284] BPF:) [ 2901.392367][ T5291] BPF:btf_header not found [ 2901.399558][ T5289] BPF:Unsupported section found [ 2901.401398][ T5284] BPF: 09:58:21 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:21 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0xffff0f00}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2901.409742][ T5292] BPF:Unsupported section found [ 2901.417043][ T5284] BPF:Invalid arg#1 [ 2901.437910][ T5284] BPF: [ 2901.437910][ T5284] 09:58:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:21 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x0, @dev={0xac, 0x14, 0x14, 0xf}, 0x4e24, 0x4, 'lblc\x00', 0xd4f74bff93142d34, 0x0, 0x59}, 0x2c) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2901.578260][ T5299] BPF:Unsupported flags [ 2901.615922][ T5304] BPF:Unsupported flags [ 2901.629043][ T5302] BPF:[1] Invalid name_offset:4294905600 [ 2901.635312][ T5303] BPF:Unsupported section found [ 2901.658580][ T5307] BPF:Unsupported section found [ 2901.664657][ T5308] BPF:[1] Invalid name_offset:4294905600 [ 2901.687465][ T5306] IPVS: set_ctl: invalid protocol: 0 172.20.20.15:20004 [ 2901.709922][ T5306] BPF:[1] ENUM (anon) [ 2901.719795][ T5306] BPF:size=4 vlen=1 [ 2901.737051][ T5306] BPF: [ 2901.741105][ T5306] BPF:Invalid name [ 2901.750548][ T5306] BPF: [ 2901.750548][ T5306] [ 2901.785029][ T5311] IPVS: set_ctl: invalid protocol: 0 172.20.20.15:20004 09:58:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180002}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x100, 0x0, 0x412, 0x70bd2d, 0x25dfdc02, {}, [@IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x13}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x4}}]}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'caif0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ifb0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x40000}, 0x40040090) [ 2901.874979][ T5277] BPF:Unsupported flags 09:58:21 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:21 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x74}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:21 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0xffff8000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:21 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400000002000000000000000100000000f1334f067be88bea7068f38e0a398b627272f206a5dd61790166875e35f67c687b1795427e01c0472e104c24f46afcedbc113f9982f863b74ac9fb54a7ba2668dd90d11fdf576a277ba3f5b7814779f3ddb3abafeebcddd09dacc3768780255ca43e02512a8565d4b1ba1ff539fc8c19f504baad5bdce9a6a6bdc2184df39e15d8ffb4da5fc583ed5159cbad2c857ddbb9e959f8f2059cb54487863f49c4ff1a7a60b655"], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) [ 2901.949862][ T5322] BPF:Invalid string section [ 2901.954737][ T5321] BPF:Unsupported section found [ 2901.967725][ T5323] BPF:[1] Invalid name_offset:4294934528 [ 2901.972096][ T5324] BPF:Unsupported flags [ 2901.974024][ T5325] BPF:Invalid string section [ 2901.984953][ T5320] BPF:[1] FUNC_PROTO (anon) [ 2901.989601][ T5320] BPF:return=0 args=( [ 2901.989962][ T5326] BPF:[1] Invalid name_offset:4294934528 [ 2901.999755][ T5327] BPF:Unsupported flags [ 2902.004789][ T5320] BPF:116 (anon) [ 2902.011149][ T5320] BPF:, 4 (invalid-name-offset) [ 2902.016054][ T5320] BPF:) [ 2902.018828][ T5320] BPF: [ 2902.028532][ T5328] BPF:Unsupported section found [ 2902.048383][ T5320] BPF:Invalid arg#1 09:58:22 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0xffffff00}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xdb, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2902.071018][ T5320] BPF: [ 2902.071018][ T5320] [ 2902.086401][ T5331] BPF:[1] FUNC_PROTO (anon) 09:58:22 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000700)=""/220, 0xfffffffffffffefa, 0xdc, 0x8}, 0x20) 09:58:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2902.171512][ T5331] BPF:return=0 args=( [ 2902.180026][ T5331] BPF:116 (anon) [ 2902.192201][ T5334] BPF:[1] DATASEC (anon) [ 2902.193132][ T5335] BPF:[1] Invalid name_offset:4294967040 [ 2902.208630][ T5334] BPF:size=0 vlen=0 [ 2902.219405][ T5334] BPF: [ 2902.232530][ T5334] BPF:vlen == 0 [ 2902.243926][ T5331] BPF:, 4 (invalid-name-offset) [ 2902.249314][ T5340] BPF:[1] Invalid name_offset:4294967040 [ 2902.253704][ T5331] BPF:) [ 2902.273273][ T5334] BPF: [ 2902.273273][ T5334] [ 2902.281087][ T5331] BPF: [ 2902.288525][ T5331] BPF:Invalid arg#1 [ 2902.301910][ T5344] BPF:Unsupported section found [ 2902.301973][ T5331] BPF: [ 2902.301973][ T5331] [ 2902.308400][ T5343] BPF:[1] DATASEC (anon) [ 2902.319092][ T5345] BPF:Unsupported flags 09:58:22 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0xffffffe4}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:22 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x7a}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2902.336294][ T5343] BPF:size=0 vlen=0 [ 2902.340138][ T5343] BPF: [ 2902.345055][ T5348] BPF:Unsupported section found [ 2902.345827][ T5349] BPF:Unsupported flags [ 2902.381578][ T5343] BPF:vlen == 0 [ 2902.400644][ T5343] BPF: [ 2902.400644][ T5343] [ 2902.445568][ T5355] BPF:[1] Invalid name_offset:4294967268 09:58:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) accept$alg(r1, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000080)=0x7) 09:58:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) r3 = accept$ax25(0xffffffffffffffff, &(0x7f0000000800)={{0x3, @default}, [@rose, @null, @netrom, @bcast, @bcast, @null, @netrom, @default]}, &(0x7f0000000300)=0x48) ioctl$SIOCAX25GETINFOOLD(r3, 0x89e9, &(0x7f00000003c0)) sendfile(r1, r2, &(0x7f0000000000), 0xffe) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000000)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r4, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r4, 0x6628, 0x0) sendmsg$TIPC_NL_MON_SET(r4, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x883000}, 0xc, &(0x7f0000000240)={&(0x7f0000000440)={0x248, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8001}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'rose0\x00'}}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa1ac}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xbb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x76c}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA={0xbc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffff25}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3e9}]}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x4}, 0x2000400) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") recvfrom(r5, &(0x7f00000000c0)=""/133, 0x85, 0x2000, &(0x7f0000000180)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400060400"/33], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) 09:58:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2902.504273][ T5358] BPF:[1] Invalid name_offset:4294967268 [ 2902.510349][ T5357] BPF:[1] FUNC_PROTO (anon) [ 2902.521201][ T5357] BPF:return=0 args=( [ 2902.525224][ T5357] BPF:122 (anon) [ 2902.528776][ T5357] BPF:, 4 (invalid-name-offset) [ 2902.551058][ T5357] BPF:) 09:58:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x1d, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:22 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2902.553997][ T5357] BPF: [ 2902.556909][ T5357] BPF:Invalid arg#1 [ 2902.580065][ T5357] BPF: [ 2902.580065][ T5357] [ 2902.623608][ T5366] BPF:[1] DATASEC (anon) [ 2902.625929][ T5365] BPF:Unsupported section found [ 2902.651430][ T5366] BPF:size=0 vlen=0 [ 2902.666752][ T5368] BPF:[1] FUNC_PROTO (anon) [ 2902.674072][ T5366] BPF: [ 2902.682668][ T5372] BPF:Invalid section offset [ 2902.691347][ T5371] BPF:Unsupported section found [ 2902.692043][ T5366] BPF:vlen == 0 [ 2902.709179][ T5368] BPF:return=0 args=( [ 2902.711032][ T5375] BPF:Total section length too long [ 2902.721259][ T5366] BPF: 09:58:22 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2902.721259][ T5366] [ 2902.729257][ T5368] BPF:122 (anon) [ 2902.752137][ T5369] BPF:[1] DATASEC (anon) [ 2902.756511][ T5369] BPF:size=0 vlen=0 [ 2902.760663][ T5369] BPF: [ 2902.764415][ T5368] BPF:, 4 (invalid-name-offset) [ 2902.769387][ T5368] BPF:) 09:58:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2902.781070][ T5378] BPF:Total section length too long [ 2902.790697][ T5368] BPF: [ 2902.806115][ T5368] BPF:Invalid arg#1 [ 2902.810042][ T5368] BPF: [ 2902.810042][ T5368] [ 2902.842824][ T5383] BPF:[1] INT (anon) [ 2902.852147][ T5369] BPF:vlen == 0 [ 2902.855654][ T5369] BPF: [ 2902.855654][ T5369] [ 2902.872501][ T5383] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) 09:58:22 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0xda}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x2a, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2902.890305][ T5386] BPF:Unsupported section found [ 2902.899772][ T5383] BPF: [ 2902.921024][ T5383] BPF:vlen != 0 [ 2902.926316][ T5387] BPF:Unsupported section found [ 2902.930069][ T5383] BPF: [ 2902.930069][ T5383] 09:58:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x6628, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000480)={r4}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000000c0)={r4, 0x4, 0x4, [0xfff8, 0x5, 0x26b9, 0x9]}, 0x10) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = socket(0xa, 0x5, 0x3a) r7 = syz_genetlink_get_family_id$nbd(&(0x7f0000000540)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r6, &(0x7f0000000600)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x2c, r7, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7620}, @NBD_ATTR_CLIENT_FLAGS={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x40) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2902.943752][ T5388] BPF:[1] INT (anon) [ 2902.953501][ T5388] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2902.968112][ T5388] BPF: [ 2902.977737][ T5388] BPF:vlen != 0 09:58:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2903.031912][ T5388] BPF: [ 2903.031912][ T5388] [ 2903.037239][ T5392] BPF:[1] FUNC_PROTO (anon) [ 2903.069220][ T5392] BPF:return=0 args=( [ 2903.088654][ T5395] BPF:Unsupported btf_header 09:58:23 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x4}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2903.110822][ T5392] BPF:218 (anon) [ 2903.125352][ T5398] BPF:Unsupported btf_header [ 2903.144219][ T5392] BPF:, 4 (invalid-name-offset) [ 2903.176690][ T5401] BPF:Unsupported section found 09:58:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x2b, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2903.199863][ T5392] BPF:) [ 2903.209458][ T5404] BPF:Unsupported section found [ 2903.214031][ T5392] BPF: [ 2903.217125][ T5392] BPF:Invalid arg#1 [ 2903.251055][ T5392] BPF: [ 2903.251055][ T5392] [ 2903.265849][ T5410] BPF:[1] FUNC_PROTO (anon) [ 2903.270490][ T5410] BPF:return=0 args=( [ 2903.274310][ T5407] BPF:[1] INT (anon) [ 2903.300157][ T5407] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2903.308788][ T5411] BPF:btf_header not found [ 2903.325589][ T5413] BPF:btf_header not found [ 2903.336086][ T5407] BPF: [ 2903.339010][ T5407] BPF:vlen != 0 [ 2903.343321][ T5412] BPF:[1] DATASEC (anon) [ 2903.347722][ T5412] BPF:size=0 vlen=0 [ 2903.351638][ T5410] BPF:218 (anon) [ 2903.355194][ T5410] BPF:, 4 (invalid-name-offset) [ 2903.360060][ T5410] BPF:) [ 2903.367443][ T5407] BPF: [ 2903.367443][ T5407] [ 2903.392805][ T5416] BPF:[1] INT (anon) [ 2903.396847][ T5416] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2903.421098][ T5412] BPF: [ 2903.424077][ T5412] BPF:vlen == 0 [ 2903.432478][ T5416] BPF: [ 2903.434372][ T5372] BPF:Invalid section offset [ 2903.435398][ T5412] BPF: [ 2903.435398][ T5412] [ 2903.445793][ T5416] BPF:vlen != 0 [ 2903.449348][ T5416] BPF: [ 2903.449348][ T5416] [ 2903.459685][ T5410] BPF: [ 2903.469418][ T5410] BPF:Invalid arg#1 [ 2903.489512][ T5410] BPF: [ 2903.489512][ T5410] 09:58:23 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) accept$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r4 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f0000000100)={r4, 0x0, 0xfffffffffffffffd, 0x282, 0x8}) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r5, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r5, 0x6628, 0x0) getsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000180), &(0x7f0000000380)=0x4) write$cgroup_int(r2, &(0x7f00000003c0), 0x414) ioctl$EXT4_IOC_SETFLAGS(r2, 0x6628, 0x0) socket$isdn(0x22, 0x3, 0x3) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000000), &(0x7f00000000c0)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800001800000000020000000c000000020000000000c6c3e4c3061950a520a464e43928ad35c3262491193d488f74a899d7f14e806f70f53411bbe60528f42593e95d069b82e3b92674763f175708600a35c4caeefbd73e60f5b3da60fddf5bb96d7fe8cb6181a346716199b4cb6913c4dbc411f8abbe633250802846061fac"], &(0x7f00000001c0)=""/231, 0x13, 0xdc, 0x8}, 0x20) 09:58:23 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x8}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:23 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:23 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x300}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2903.589717][ T5421] BPF:btf_header not found [ 2903.616635][ T5424] BPF:Unsupported section found [ 2903.624016][ T5426] BPF:btf_header not found [ 2903.636784][ T5422] BPF:[1] INT (anon) [ 2903.652202][ T5422] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2903.677934][ T5428] BPF:Unsupported section found [ 2903.681235][ T5422] BPF: [ 2903.691187][ T5422] BPF:vlen != 0 [ 2903.694764][ T5422] BPF: [ 2903.694764][ T5422] 09:58:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x34, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2903.719116][ T5432] BPF:[1] INT (anon) [ 2903.723645][ T5432] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2903.752038][ T5429] BPF:[1] FUNC_PROTO (anon) [ 2903.759653][ T5432] BPF: 09:58:23 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2903.770425][ T5429] BPF:return=0 args=( [ 2903.774204][ T5432] BPF:vlen != 0 [ 2903.790199][ T5432] BPF: [ 2903.790199][ T5432] [ 2903.795519][ T5429] BPF:768 (anon) [ 2903.814229][ T5429] BPF:, 4 (invalid-name-offset) 09:58:23 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x10}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2903.839401][ T5429] BPF:) [ 2903.848295][ T5436] BPF:btf_header not found [ 2903.858579][ T5429] BPF: [ 2903.869058][ T5437] BPF:btf_header not found [ 2903.874614][ T5439] BPF:btf_header not found [ 2903.879592][ T5429] BPF:Invalid arg#1 [ 2903.911056][ T5429] BPF: [ 2903.911056][ T5429] [ 2903.931049][ T5443] BPF:[1] FUNC_PROTO (anon) [ 2903.935688][ T5443] BPF:return=0 args=( [ 2903.939676][ T5443] BPF:768 (anon) [ 2903.957861][ T5441] BPF:Unsupported section found [ 2903.961480][ T5412] BPF:[1] DATASEC (anon) [ 2903.969465][ T5445] BPF:Unsupported section found [ 2903.970676][ T5412] BPF:size=0 vlen=0 [ 2904.006575][ T5412] BPF: [ 2904.015820][ T5412] BPF:vlen == 0 [ 2904.020998][ T5448] BPF:[1] INT (anon) [ 2904.025220][ T5448] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2904.031646][ T5412] BPF: [ 2904.031646][ T5412] [ 2904.037937][ T5443] BPF:, 4 (invalid-name-offset) [ 2904.060531][ T5448] BPF: [ 2904.061012][ T5443] BPF:) [ 2904.075469][ T5443] BPF: [ 2904.081650][ T5448] BPF:vlen != 0 [ 2904.083986][ T5443] BPF:Invalid arg#1 [ 2904.095145][ T5443] BPF: [ 2904.095145][ T5443] [ 2904.097540][ T5448] BPF: [ 2904.097540][ T5448] 09:58:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) bind(r0, &(0x7f0000000080)=@sco={0x1f, {0x1, 0x5, 0x3, 0x3, 0x9, 0x9a}}, 0x80) 09:58:24 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x35, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xf, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2904.143589][ T5451] BPF:[1] INT (anon) 09:58:24 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x500}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2904.163928][ T5451] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2904.201076][ T5451] BPF: [ 2904.204003][ T5451] BPF:vlen != 0 [ 2904.208117][ T5454] BPF:Unsupported section found [ 2904.231623][ T5455] BPF:btf_header not found [ 2904.237819][ T5451] BPF: [ 2904.237819][ T5451] [ 2904.251233][ T5457] BPF:btf_header not found [ 2904.259398][ T5459] BPF:Unsupported section found [ 2904.287300][ T5460] BPF:[1] FUNC_PROTO (anon) [ 2904.306452][ T5460] BPF:return=0 args=( [ 2904.317366][ T5460] BPF:1280 (anon) [ 2904.337915][ T5460] BPF:, 4 (invalid-name-offset) [ 2904.363476][ T5460] BPF:) [ 2904.366350][ T5460] BPF: [ 2904.391024][ T5460] BPF:Invalid arg#1 [ 2904.409337][ T5460] BPF: [ 2904.409337][ T5460] [ 2904.433793][ T5466] BPF:[1] FUNC_PROTO (anon) [ 2904.438432][ T5466] BPF:return=0 args=( [ 2904.455049][ T5465] BPF:[1] DATASEC (anon) [ 2904.475887][ T5465] BPF:size=0 vlen=0 [ 2904.484783][ T5465] BPF: [ 2904.488163][ T5466] BPF:1280 (anon) [ 2904.492382][ T5465] BPF:vlen == 0 [ 2904.500447][ T5466] BPF:, 4 (invalid-name-offset) [ 2904.505925][ T5465] BPF: [ 2904.505925][ T5465] [ 2904.511483][ T5466] BPF:) [ 2904.514348][ T5466] BPF: [ 2904.517188][ T5466] BPF:Invalid arg#1 [ 2904.521814][ T5468] BPF:[1] DATASEC (anon) 09:58:24 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180004000000000200ff7f00000000010073f3c3b1f822b48f0011000000000000bcc47d9ff2b8441c5f5d2c0000000069a8e55e8a2657cf20fda802d1b27aac901f8ead1d1eaa7252a8783bc58d92ab828c8403be57ef887585cee7d22eafc74077b1f6da5fa91cc704d16b894fcc679e010784013897a4f2"], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) 09:58:24 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x12}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:24 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x4a, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x18, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:24 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x600}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2904.526555][ T5466] BPF: [ 2904.526555][ T5466] [ 2904.531120][ T5468] BPF:size=0 vlen=0 [ 2904.540119][ T5468] BPF: [ 2904.546979][ T5468] BPF:vlen == 0 [ 2904.550354][ T5437] BPF:btf_header not found [ 2904.566110][ T5468] BPF: [ 2904.566110][ T5468] 09:58:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") close(r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9febdfff17000000000000000c00006d9c1a766a92c3d8fe08d8006d2cc53c669d0c00000002000000000000000000000f"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2904.637861][ T5474] BPF:[1] INT (anon) [ 2904.644568][ T5474] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2904.644675][ T5473] BPF:btf_header not found [ 2904.655265][ T5474] BPF: [ 2904.658760][ T5474] BPF:vlen != 0 [ 2904.692139][ T5474] BPF: [ 2904.692139][ T5474] [ 2904.699094][ T5476] BPF:[1] FUNC_PROTO (anon) [ 2904.701627][ T5477] BPF:Unsupported section found [ 2904.710496][ T5480] BPF:btf_header not found [ 2904.710740][ T5479] BPF:Unsupported section found [ 2904.722204][ T5481] BPF:[1] INT (anon) [ 2904.726355][ T5481] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2904.734439][ T5476] BPF:return=0 args=( 09:58:24 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x3e4, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2904.755661][ T5481] BPF: [ 2904.761165][ T5476] BPF:1536 (anon) [ 2904.765101][ T5476] BPF:, 4 (invalid-name-offset) [ 2904.770610][ T5481] BPF:vlen != 0 [ 2904.776083][ T5483] BPF:Unsupported version [ 2904.788626][ T5481] BPF: [ 2904.788626][ T5481] [ 2904.794306][ T5476] BPF:) [ 2904.797165][ T5476] BPF: 09:58:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:24 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2904.811119][ T5476] BPF:Invalid arg#1 [ 2904.822164][ T5476] BPF: [ 2904.822164][ T5476] [ 2904.860169][ T5486] BPF:[1] FUNC_PROTO (anon) 09:58:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000700)=""/220, 0x1a, 0xdc, 0x8}, 0x20) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r2, r3, &(0x7f0000000000), 0xffe) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000680)={r2}) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r4, 0x118, 0x1, &(0x7f00000006c0)=0x3, 0x4) socket$bt_hidp(0x1f, 0x3, 0x6) [ 2904.951562][ T5486] BPF:return=0 args=( [ 2904.968704][ T5486] BPF:1536 (anon) [ 2904.992673][ T5486] BPF:, 4 (invalid-name-offset) [ 2905.001967][ T5496] BPF:Unsupported section found [ 2905.007813][ T5494] BPF:[1] INT (anon) [ 2905.012220][ T5494] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2905.020345][ T5498] BPF:Unsupported section found [ 2905.028869][ T5499] BPF:btf_header not found [ 2905.029983][ T5486] BPF:) [ 2905.033799][ T5500] BPF:btf_header not found [ 2905.041346][ T5494] BPF: [ 2905.045420][ T5494] BPF:vlen != 0 [ 2905.049468][ T5501] BPF:btf_header not found [ 2905.054139][ T5486] BPF: [ 2905.054371][ T5494] BPF: [ 2905.054371][ T5494] [ 2905.062553][ T5486] BPF:Invalid arg#1 [ 2905.066595][ T5503] BPF:btf_header not found [ 2905.079808][ T5502] BPF:No type found [ 2905.084055][ T5504] BPF:[1] INT (anon) 09:58:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010000000000000001000006040100000000000017000000000000000000000000000000ea07c66107271bd74c89f75a17df3efc2eb53d65654d766625c011fcc644cc67946d7f1982c00028b1ad8ec159fab164d863490d20"], &(0x7f0000000700)=""/220, 0x2e, 0xdc, 0x8}, 0x20) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000300), &(0x7f0000000340)=0x4) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r3, 0x218, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xf2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x90}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x24c3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51afceece9c69fd5}, 0x8000010) 09:58:25 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x700}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2905.088057][ T5504] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2905.091523][ T5486] BPF: [ 2905.091523][ T5486] [ 2905.116570][ T5505] BPF:No type found [ 2905.141549][ T5504] BPF: [ 2905.144474][ T5504] BPF:vlen != 0 [ 2905.151009][ T5504] BPF: [ 2905.151009][ T5504] 09:58:25 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2905.223440][ T5513] BPF:Unsupported section found 09:58:25 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x334}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000100)={0x77359400}, 0x10) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r2 = socket(0x19, 0x6, 0x7) r3 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r3, 0x110, 0x5, &(0x7f00000000c0)=[0x2, 0x1], 0x2) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000000)=0x69, 0x2) ioctl(r1, 0x8912, &(0x7f0000000040)="480020c00000f829e53d8a") [ 2905.244839][ T5512] BPF:Invalid magic [ 2905.251145][ T5515] BPF:Unsupported section found [ 2905.308852][ T5517] BPF:Invalid magic [ 2905.320484][ T5518] BPF:[1] FUNC_PROTO (anon) [ 2905.356761][ T5518] BPF:return=0 args=( [ 2905.366734][ T5524] BPF:[1] INT (anon) [ 2905.381039][ T5518] BPF:1792 (anon) [ 2905.387200][ T5524] BPF:size=0 bits_offset=9 nr_bits=0 encoding=(none) [ 2905.398855][ T5518] BPF:, 4 (invalid-name-offset) 09:58:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x60, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYRES64=0x0, @ANYRESHEX, @ANYRESHEX, @ANYRES64=r0]], &(0x7f0000000700)=""/220, 0x2e, 0x15, 0x8}, 0x20) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000080)={'ip6gre0\x00', {0x2, 0x4e24, @loopback}}) [ 2905.406509][ T5526] BPF:[1] INT (anon) [ 2905.406817][ T5524] BPF: [ 2905.417546][ T5526] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2905.422171][ T5518] BPF:) [ 2905.428300][ T5518] BPF: [ 2905.437021][ T5524] BPF:nr_bits exceeds type_size [ 2905.437619][ T5526] BPF: [ 2905.447732][ T5526] BPF:vlen != 0 [ 2905.455543][ T5518] BPF:Invalid arg#1 [ 2905.465257][ T5524] BPF: [ 2905.465257][ T5524] [ 2905.471526][ T5518] BPF: [ 2905.471526][ T5518] [ 2905.488703][ T5533] BPF:[1] FUNC_PROTO (anon) [ 2905.491230][ T5532] BPF:[1] INT (anon) [ 2905.493651][ T5526] BPF: [ 2905.493651][ T5526] [ 2905.503661][ T5532] BPF:size=0 bits_offset=9 nr_bits=0 encoding=(none) [ 2905.510353][ T5532] BPF: [ 2905.511625][ T5535] BPF:[1] INT (anon) [ 2905.517260][ T5533] BPF:return=0 args=( [ 2905.523679][ T5535] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2905.537849][ T5533] BPF:1792 (anon) [ 2905.550741][ T5535] BPF: 09:58:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") socket$inet(0x2, 0x808, 0x40) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2905.556146][ T5533] BPF:, 4 (invalid-name-offset) [ 2905.562326][ T5539] BPF:Unsupported section found [ 2905.570371][ T5535] BPF:vlen != 0 [ 2905.576577][ T5533] BPF:) [ 2905.580400][ T5535] BPF: [ 2905.580400][ T5535] [ 2905.586992][ T5541] BPF:Unsupported section found [ 2905.592246][ T5533] BPF: [ 2905.595251][ T5533] BPF:Invalid arg#1 [ 2905.611384][ T5533] BPF: [ 2905.611384][ T5533] 09:58:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:25 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x1200}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2905.659704][ T5532] BPF:nr_bits exceeds type_size 09:58:25 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0xa00}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2905.761868][ T5532] BPF: [ 2905.761868][ T5532] [ 2905.782540][ T5554] BPF:[1] DATASEC (anon) [ 2905.798057][ T5554] BPF:size=0 vlen=0 [ 2905.811612][ T5555] BPF:[1] INT (anon) [ 2905.815645][ T5555] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2905.821294][ T5554] BPF: 09:58:25 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2905.840357][ T5554] BPF:vlen == 0 [ 2905.846753][ T5554] BPF: [ 2905.846753][ T5554] [ 2905.865356][ T5558] BPF:[1] INT (anon) [ 2905.872404][ T5560] BPF:Unsupported section found [ 2905.878878][ T5558] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2905.879327][ T5559] BPF:[1] FUNC_PROTO (anon) [ 2905.901399][ T5558] BPF: [ 2905.905764][ T5563] BPF:Unsupported section found [ 2905.915564][ T5558] BPF:vlen != 0 [ 2905.926764][ T5555] BPF: [ 2905.927433][ T5558] BPF: [ 2905.927433][ T5558] [ 2905.929617][ T5555] BPF:vlen != 0 [ 2905.929631][ T5555] BPF: [ 2905.929631][ T5555] 09:58:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) sendmsg$nl_generic(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1142000}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x1bc, 0x39, 0x100, 0x70bd2d, 0x25dfdbfe, {0x15}, [@generic="c294ac104d03957fc883e1ee92eed0fa6a861ee1f993c437084fbcfc30b23bea6f125e922ed700d2c4cac2b6fbba4737a63e8be80610ba8857e3f557caecea0862951004dc18e0a6c25913053f17cfa15f75629c6d1c909e904c4573d4707ee88d9a9459e726f3e74517ba5b6f462b1ef4196270f0718afb7abffeb7e97f886038804e6200c504ba9d5dcc961b2bee4c7902f7c322745635335db2e1dae4616c9db2d0a5a6125f290464328a555b31cfc6c6e71ec98232d1ed8adf837f96af044687d68ee9", @generic="9b30db19327cf0fc0fe9d358aae89fc2a31d49dfc39281aba1d4a6f89dd9b4afc2bccafe47ae91af8c7296e07d7dcae487cbe0adbb570a5dced053065fcf9eec62b5d2cc364f0f90c242eae90955d71e4c6acff81359462c94e9dd2600db8987997fc27bc3da4d9cdf7b031d1c318b413ac9fa77a56f002aefdb2b2e0994ace64e506acee97b20d15ce6488d5fc589cb1972d200966c423ac5185f6a5575f7c080d08aab838e8de13f746cc5131633c4a7424fef05f62d9b0c24b538bc8db8fcd3bad6544732c3b7a79b2ce675efcaa393efdf3e458d84dcf33483aa68fe6f16fa852e"]}, 0x1bc}, 0x1, 0x0, 0x0, 0x80}, 0x1) 09:58:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2905.969948][ T5559] BPF:return=0 args=( [ 2905.988613][ T5559] BPF:2560 (anon) [ 2905.994382][ T5566] BPF:Unsupported section found [ 2905.999558][ T5559] BPF:, 4 (invalid-name-offset) 09:58:26 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2906.025896][ T5568] BPF:[1] INT (anon) [ 2906.044291][ T5568] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2906.071026][ T5559] BPF:) [ 2906.074042][ T5559] BPF: [ 2906.078068][ T5573] BPF:Unsupported section found [ 2906.098617][ T5568] BPF: [ 2906.101611][ T5559] BPF:Invalid arg#1 [ 2906.116847][ T5568] BPF:vlen != 0 [ 2906.120415][ T5575] BPF:Unsupported section found [ 2906.125644][ T5559] BPF: [ 2906.125644][ T5559] [ 2906.152214][ T5577] BPF:[1] INT (anon) [ 2906.154125][ T5568] BPF: [ 2906.154125][ T5568] [ 2906.157884][ T5577] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2906.168693][ T5577] BPF: 09:58:26 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2906.168773][ T5571] BPF:[1] DATASEC (anon) [ 2906.176847][ T5578] BPF:[1] FUNC_PROTO (anon) [ 2906.185687][ T5579] BPF:Unsupported section found [ 2906.192861][ T5577] BPF:vlen != 0 [ 2906.200204][ T5571] BPF:size=0 vlen=0 [ 2906.204649][ T5577] BPF: [ 2906.204649][ T5577] [ 2906.210822][ T5578] BPF:return=0 args=( [ 2906.215374][ T5571] BPF: 09:58:26 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x3403}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2906.231780][ T5578] BPF:2560 (anon) [ 2906.240234][ T5571] BPF:vlen == 0 [ 2906.251184][ T5578] BPF:, 4 (invalid-name-offset) [ 2906.256165][ T5578] BPF:) [ 2906.276546][ T5571] BPF: [ 2906.276546][ T5571] 09:58:26 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2906.291128][ T5578] BPF: [ 2906.307570][ T5581] BPF:[1] DATASEC (anon) [ 2906.316917][ T5585] BPF:Unsupported section found [ 2906.326569][ T5581] BPF:size=0 vlen=0 [ 2906.330731][ T5578] BPF:Invalid arg#1 09:58:26 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2906.341254][ T5578] BPF: [ 2906.341254][ T5578] [ 2906.349787][ T5587] BPF:Unsupported section found [ 2906.372202][ T5581] BPF: [ 2906.383739][ T5581] BPF:vlen == 0 [ 2906.397785][ T5581] BPF: [ 2906.397785][ T5581] 09:58:26 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x1c00}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2906.420436][ T5592] BPF:[1] INT (anon) [ 2906.432453][ T5593] BPF:[1] INT (anon) [ 2906.437279][ T5593] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2906.460166][ T5592] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) 09:58:26 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2906.476800][ T5595] BPF:Unsupported section found [ 2906.479858][ T5592] BPF: [ 2906.487844][ T5592] BPF:vlen != 0 [ 2906.494742][ T5593] BPF: [ 2906.497820][ T5592] BPF: [ 2906.497820][ T5592] [ 2906.507315][ T5593] BPF:vlen != 0 [ 2906.514061][ T5593] BPF: [ 2906.514061][ T5593] 09:58:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r1, 0x3, 0x10}, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) [ 2906.525141][ T5599] BPF:Unsupported section found [ 2906.550287][ T5601] BPF:[1] INT (anon) [ 2906.560048][ T5597] BPF:[1] FUNC_PROTO (anon) [ 2906.565109][ T5601] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) 09:58:26 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2906.608760][ T5601] BPF: [ 2906.612930][ T5597] BPF:return=0 args=( [ 2906.626054][ T5601] BPF:vlen != 0 [ 2906.641052][ T5597] BPF:7168 (anon) 09:58:26 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2906.654781][ T5606] BPF:Unsupported section found [ 2906.657675][ T5601] BPF: [ 2906.657675][ T5601] [ 2906.667085][ T5597] BPF:, 4 (invalid-name-offset) [ 2906.673889][ T5607] BPF:Unsupported section found [ 2906.683509][ T5597] BPF:) [ 2906.696783][ T5597] BPF: 09:58:26 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x4000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2906.706521][ T5597] BPF:Invalid arg#1 [ 2906.715447][ T5605] BPF:[1] DATASEC (anon) [ 2906.729016][ T5597] BPF: [ 2906.729016][ T5597] [ 2906.737339][ T5609] BPF:[1] INT (anon) [ 2906.747547][ T5605] BPF:size=0 vlen=0 [ 2906.754873][ T5613] BPF:[1] FUNC_PROTO (anon) 09:58:26 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2906.767197][ T5614] BPF:Unsupported section found [ 2906.773503][ T5613] BPF:return=0 args=( [ 2906.797941][ T5605] BPF: [ 2906.798794][ T5613] BPF:7168 (anon) [ 2906.802946][ T5609] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2906.819145][ T5605] BPF:vlen == 0 [ 2906.824115][ T5617] BPF:Unsupported section found [ 2906.845141][ T5605] BPF: [ 2906.845141][ T5605] [ 2906.846366][ T5613] BPF:, 4 (invalid-name-offset) [ 2906.857298][ T5609] BPF: [ 2906.865783][ T5609] BPF:vlen != 0 09:58:26 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xdb, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2906.883518][ T5613] BPF:) [ 2906.887497][ T5616] BPF:[1] DATASEC (anon) [ 2906.901404][ T5609] BPF: [ 2906.901404][ T5609] [ 2906.902325][ T5613] BPF: [ 2906.910033][ T5616] BPF:size=0 vlen=0 [ 2906.913574][ T5621] BPF:[1] INT (anon) [ 2906.915588][ T5616] BPF: [ 2906.920277][ T5621] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2906.932637][ T5613] BPF:Invalid arg#1 [ 2906.934912][ T5616] BPF:vlen == 0 [ 2906.936868][ T5613] BPF: [ 2906.936868][ T5613] [ 2906.940055][ T5622] BPF:Unsupported section found [ 2906.951567][ T5621] BPF: [ 2906.957899][ T5621] BPF:vlen != 0 [ 2906.973404][ T5621] BPF: [ 2906.973404][ T5621] 09:58:26 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:26 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x1e00}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2906.981855][ T5616] BPF: [ 2906.981855][ T5616] [ 2906.996376][ T5625] BPF:Unsupported section found [ 2906.999549][ T5627] BPF:[1] INT (anon) [ 2907.021116][ T5627] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) 09:58:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") [ 2907.031808][ T5628] BPF:Unsupported section found [ 2907.056056][ T5629] BPF:Unsupported section found [ 2907.060179][ T5627] BPF: [ 2907.079729][ T5627] BPF:vlen != 0 [ 2907.098549][ T5627] BPF: [ 2907.098549][ T5627] 09:58:27 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2907.158505][ T5637] BPF:[1] FUNC_PROTO (anon) [ 2907.187395][ T5637] BPF:return=0 args=( [ 2907.203591][ T5637] BPF:7680 (anon) 09:58:27 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0xdb00}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2907.207471][ T5639] BPF:[1] INT (anon) [ 2907.208366][ T5637] BPF:, 4 (invalid-name-offset) [ 2907.219501][ T5639] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2907.219786][ T5637] BPF:) [ 2907.229774][ T5637] BPF: [ 2907.256125][ T5639] BPF: [ 2907.277853][ T5641] BPF:Unsupported section found [ 2907.278427][ T5637] BPF:Invalid arg#1 [ 2907.283316][ T5639] BPF:vlen != 0 [ 2907.291183][ T5637] BPF: [ 2907.291183][ T5637] [ 2907.309662][ T5639] BPF: [ 2907.309662][ T5639] 09:58:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000600)=ANY=[@ANYPTR64], 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000000200)={@rand_addr="5218721cd3033e4d1958a14070c7fae7", r4}, 0x187) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000500)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x13}}, @in6={0xa, 0x4e24, 0x7, @ipv4={[], [], @loopback}, 0x8000}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}, @in6={0xa, 0x4e22, 0x3, @dev={0xfe, 0x80, [], 0x20}, 0x20953cda}, @in6={0xa, 0x4e23, 0xfff, @empty, 0xc2fc}, @in6={0xa, 0x4e24, 0x800, @remote, 0x8}], 0x9c) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000600)=ANY=[@ANYPTR64], 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_mreq(r5, 0x29, 0x15, &(0x7f0000000200)={@rand_addr="5218721cd3033e4d1958a14070c7fae7", r6}, 0x187) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x84abeb641dd41bbe}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)={0x14c, r2, 0x400, 0x70bd27, 0x25dfdbfe, {}, [{{0x8, 0x1, r4}, {0x80, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}]}}, {{0x8, 0x1, r8}, {0xa8, 0x2, [{0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x5, 0x5, 0x7f, 0x2}, {0x8001, 0xcf, 0xe, 0xbb}, {0x5, 0x1f, 0x81, 0xea6}, {0x7, 0x7, 0x2, 0x3b7}, {0x7ff, 0x4, 0x8, 0x2}, {0x8, 0x9, 0x1, 0x1e3dff49}, {0x5a52, 0x82, 0x6, 0xb910}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x80}, 0x20000010) [ 2907.324367][ T5649] BPF:[1] FUNC_PROTO (anon) [ 2907.328751][ T5647] BPF:[1] INT (anon) [ 2907.333219][ T5644] BPF:Unsupported section found [ 2907.346900][ T5649] BPF:return=0 args=( 09:58:27 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:27 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2907.368658][ T5649] BPF:7680 (anon) [ 2907.386556][ T5647] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2907.401239][ T5649] BPF:, 4 (invalid-name-offset) [ 2907.410645][ T5652] BPF:Unsupported section found [ 2907.442285][ T5653] BPF:[1] DATASEC (anon) [ 2907.443655][ T5649] BPF:) [ 2907.451496][ T5647] BPF: [ 2907.476906][ T5649] BPF: [ 2907.488089][ T5653] BPF:size=0 vlen=0 09:58:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2907.495075][ T5647] BPF:vlen != 0 [ 2907.517086][ T5659] BPF:[1] INT (anon) [ 2907.517844][ T5649] BPF:Invalid arg#1 [ 2907.524957][ T5647] BPF: [ 2907.524957][ T5647] [ 2907.533460][ T5653] BPF: [ 2907.537795][ T5659] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2907.549499][ T5649] BPF: [ 2907.549499][ T5649] [ 2907.564629][ T5659] BPF: [ 2907.566636][ T5662] BPF:Unsupported section found [ 2907.567565][ T5653] BPF:vlen == 0 [ 2907.582336][ T5659] BPF:vlen != 0 [ 2907.588693][ T5663] BPF:[1] INT (anon) [ 2907.597723][ T5659] BPF: [ 2907.597723][ T5659] [ 2907.603402][ T5665] BPF:Unsupported section found 09:58:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2907.613681][ T5664] BPF:Unsupported section found [ 2907.614351][ T5663] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2907.629855][ T5667] BPF:Unsupported section found [ 2907.634848][ T5653] BPF: [ 2907.634848][ T5653] 09:58:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:27 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:27 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2907.680517][ T5663] BPF: [ 2907.700466][ T5663] BPF:vlen != 0 [ 2907.730042][ T5663] BPF: [ 2907.730042][ T5663] [ 2907.792590][ T5674] BPF:[1] FUNC_PROTO (anon) 09:58:27 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2907.828769][ T5674] BPF:return=0 args=( [ 2907.853156][ T5679] BPF:[1] INT (anon) [ 2907.859412][ T5678] BPF:Unsupported section found [ 2907.864787][ T5674] BPF:8192 (anon) [ 2907.871091][ T5674] BPF:, 4 (invalid-name-offset) [ 2907.883133][ T5679] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2907.903747][ T5677] BPF:Unsupported section found [ 2907.909451][ T5674] BPF:) [ 2907.913509][ T5683] BPF:Unsupported section found [ 2907.918506][ T5679] BPF: [ 2907.922947][ T5674] BPF: [ 2907.927639][ T5680] BPF:Unsupported section found [ 2907.932732][ T5679] BPF:vlen != 0 [ 2907.937486][ T5674] BPF:Invalid arg#1 [ 2907.942807][ T5679] BPF: [ 2907.942807][ T5679] [ 2907.948977][ T5674] BPF: [ 2907.948977][ T5674] [ 2907.971221][ T5685] BPF:[1] FUNC_PROTO (anon) 09:58:27 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2908.005290][ T5685] BPF:return=0 args=( 09:58:28 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2908.055852][ T5685] BPF:8192 (anon) [ 2908.075523][ T5685] BPF:, 4 (invalid-name-offset) [ 2908.111025][ T5685] BPF:) [ 2908.113925][ T5685] BPF: [ 2908.116754][ T5685] BPF:Invalid arg#1 [ 2908.140286][ T5685] BPF: [ 2908.140286][ T5685] [ 2908.170497][ T5689] BPF:Unsupported section found [ 2908.202919][ T5695] BPF:[1] INT (anon) [ 2908.207346][ T5696] BPF:Unsupported section found [ 2908.217323][ T5695] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2908.230165][ T5653] BPF:[1] DATASEC (anon) [ 2908.244934][ T5653] BPF:size=0 vlen=0 [ 2908.247413][ T5697] BPF:Unsupported section found [ 2908.249488][ T5695] BPF: [ 2908.271032][ T5653] BPF: [ 2908.273935][ T5695] BPF:vlen != 0 [ 2908.281445][ T5653] BPF:vlen == 0 [ 2908.287423][ T5695] BPF: [ 2908.287423][ T5695] [ 2908.304185][ T5653] BPF: [ 2908.304185][ T5653] [ 2908.310624][ T5703] BPF:Unsupported section found 09:58:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000000f00000000000022ed16dfa18ff45a8aebf8e29671c4522b578d1e880c85c25d11b1baade837f1b2cce6faf8a30a956bf2426062f64d3764d153c2159553b7bb0425cba1d55153ad32ce4dafedee680a7f982420d5383528feedd386ce6abce61ed22824e6cc67f4958d04747f32a2361a2c2bc8ca129b18c6864536c91a32259c19c54bc7f2e9542c814576542bcc10468dfc5146a375c814512d20821ccb99c439caee5456251f7dea08fec06b98a641eee167a6ef89aeb4f3b1ab4700c5d7e851c988cc"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:58:28 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:28 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x3f00}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:28 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:28 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2908.431483][ T5709] BPF:Unsupported section found [ 2908.438561][ T5708] BPF:[1] FUNC_PROTO (anon) [ 2908.445776][ T5712] BPF:Unsupported section found [ 2908.461287][ T5711] BPF:[1] Invalid btf_info:1020000 [ 2908.468245][ T5708] BPF:return=0 args=( [ 2908.488508][ T5708] BPF:16128 (anon) 09:58:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc00, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2908.508854][ T5716] BPF:[1] Invalid btf_info:1020000 [ 2908.510549][ T5715] BPF:[1] INT (anon) [ 2908.515298][ T5708] BPF:, 4 (invalid-name-offset) [ 2908.529066][ T5717] BPF:Unsupported section found [ 2908.530426][ T5715] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2908.544771][ T5708] BPF:) [ 2908.553192][ T5718] BPF:Unsupported section found [ 2908.571108][ T5708] BPF: [ 2908.573948][ T5708] BPF:Invalid arg#1 [ 2908.577772][ T5708] BPF: [ 2908.577772][ T5708] [ 2908.596413][ T5715] BPF: [ 2908.604029][ T5715] BPF:vlen != 0 [ 2908.614711][ T5715] BPF: [ 2908.614711][ T5715] 09:58:28 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x4}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2908.621677][ T5724] BPF:[1] FUNC_PROTO (anon) [ 2908.635847][ T5724] BPF:return=0 args=( [ 2908.642990][ T5721] BPF:[1] DATASEC (anon) [ 2908.648004][ T5721] BPF:size=0 vlen=0 [ 2908.667621][ T5721] BPF: [ 2908.674496][ T5724] BPF:16128 (anon) [ 2908.679743][ T5721] BPF:vlen == 0 [ 2908.687947][ T5721] BPF: [ 2908.687947][ T5721] [ 2908.694221][ T5725] BPF:Unsupported section found [ 2908.695612][ T5724] BPF:, 4 (invalid-name-offset) [ 2908.717775][ T5727] BPF:[1] DATASEC (anon) 09:58:28 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x12, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2908.717900][ T5728] BPF:Unsupported section found 09:58:28 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2908.748909][ T5724] BPF:) [ 2908.753389][ T5727] BPF:size=0 vlen=0 [ 2908.757538][ T5724] BPF: [ 2908.760456][ T5724] BPF:Invalid arg#1 [ 2908.764971][ T5727] BPF: [ 2908.776593][ T5727] BPF:vlen == 0 [ 2908.780011][ T5724] BPF: [ 2908.780011][ T5724] [ 2908.784145][ T5727] BPF: [ 2908.784145][ T5727] [ 2908.795261][ T5731] BPF:[1] Invalid btf_info:1040000 09:58:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xf00, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r2, r3, &(0x7f0000000000), 0xffe) getsockopt$inet_mreqn(r0, 0x0, 0x3403f68296a335f1, &(0x7f0000003e00)={@multicast1, @loopback, 0x0}, &(0x7f0000003e40)=0xc) sendmmsg$inet(r2, &(0x7f0000004000)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="611c7fc6b40c5690e88bbe51b39439d52fa615d0220632e31ade237f55b67180dcb89a10f27506e2987388a60d419a69f377b1966bdfbcb5", 0x38}, {&(0x7f00000000c0)="bbaf62bc852718392fcb01830f6146a4fefccb348cbe749cdab90cb498110175d79c3234ecff1755dd38f9", 0x2b}, {&(0x7f0000000100)="4ba239aae3e914d2f95f6b27783bfc766ee1196f22dd706c5245edb6763d1cd200d846d57eba6aaacc07ad4f36c4de5ffbd3c48ce11478253bc1d958b42a1219eb101b8a7b89b08090285a6fb188ea54694e6b90c20d1dc1f948d6ab2048e99dd0a3dacbc6844add8ba7258fe2d7e1cd5567949e1fef3fb4fe7568a05bf8070716d2a36849b09d2fdf3fc08bb7bfca9e52ee63d14fae2947d488b5fb1cfd99bfbd3d6bcc71ba557965103e86555be0ef", 0xb0}], 0x3}}, {{&(0x7f0000000200)={0x2, 0x4e22, @remote}, 0x10, &(0x7f00000018c0)=[{&(0x7f0000000240)="60d800e02d60878556bd1ca82e532865c4b5ffbd34077c6a20fd3d92dc1a8df53b510114e20b18e75f2e918beb2588183c94ae38f80a20b18d6861e0a05881c8a10314a4847249ed4be4a01422c4bce0e4e36f6f936c08de659e1540cdfb98609391f058ab18bf28d24e4a648adc8831c507062fc9f383bcf5ff56580d5b64735722e0462096787a483883ed691a9904f90d825413aa7dccba40922caee4be1634e2fd04562c23a3f9b782a571e74e1e13edc1e9eef980883c9c994395c139614aa7", 0xc2}, {&(0x7f0000000340)="2e4e9094d3d9e8e4", 0x8}, {&(0x7f0000000440)="578116bdb312d1eb8ab946bcc1e0f8bf1cf03f96a8485f213d17e5607ee05e85fc24fa4a857766f7b905088b620b85d9e752999560bf9ab0d5562d87a15d6d9739ea4f6b7c7276354004bfe03e9773ab6fa03fca3464a7fc22f1175886aaf5dc9d44fc4111fa437a04def5469741b671a3fae662cc32df5057a23883e7d23b9ca6c4836a5bf5f326a5e5f4938928a755546d897cb12ed5fb561735812089b19d98be4da0ba689ee6410b7e15650debea786a0603fafd7f423092da0f64c1f37675cdfa7c79548278919d16bce7a5054a509c462c37fcbe50c619abb9a5eae1348516fc", 0xe3}, {&(0x7f0000000380)="9c8ff63fa4391caf04211fec339667a9632a554449e87959a0985c1d6c94201ca773cc55ac319d0ebeabcf679ca1383cc2527cb2", 0x34}, {&(0x7f0000000540)="49ca4d296a5cd058b565211b86ee9181c7cafb559ffec61009c14483612a976d39ec532e4ee637b550fe4eae4bbecde39a6574ae0c8db8b52c0fa61580c54b98fd6212fe5e03101ae28eeed1aaa712748444b599dbafc8b3cb4fbddf141c7b9cf321a57f9529f18094793567d3fb", 0x6e}, {&(0x7f00000005c0)="949c75a6a4b1cbe37a49e3c28e22e6b28e6c0b532abe842d99f5f994a9119cad7fecee9ad330abd250fd15d297693bee26287f27a2fe0d1bae0caa91727b68e68994798a727eefc342cd5c31b23880a386e92dbf0cda9840db23efdb5a78b53d4a74c6766ea785e65c6fde40a42f15a5e0ca28261bfc8aea65592aab9d5744ddcdf8bb3d648c2a9897efac4f43154c3613b7b952bcb04bb6097c920edfc39a2c60ff2f266eb3fd", 0xa7}, {&(0x7f0000000680)="d99e2c5f79cfe5dee81789edbf9092fee01ca4bf59a69a36fa368def6603e193228734a378757ebcf6c4c941ca871899605c3d862c91bd7e033ef4ac597a04cb05b60b25f3d30941d99325353f19c309c2e8a07f8622cc09f8182a8ab01b44", 0x5f}, {&(0x7f0000000800)="5a9cb1203fce87c41221234219bb4ea3a3ccba5a5dfd0c4a1d5e222b2abbe710ec30bc92891d30eadce42aef4d54dc0a192faaf15fca22668a6e30ed6b06aee314594da4833059fcf4cd73e3e9e7b351c53b6127f9da56b73cbd096d3c313a245d7a0266dae3331316291023cd9d7b5c560a3d019059342e2916fa092d95eb04bb0118375442c5b5badde1ac11298dc20b2abb51", 0x94}, {&(0x7f00000008c0)="007ef3ac0906cf963ec884ae7b61e5152b9395e79a0b4f9e7ed7480e7df104cb1cadf09623bbe7432a051d19f93ff75466caad0b0e77ade8ceb9d1b236214d249265027d8dd9954c7412acd0f6dee6e95f0e4c61be9b1f52f3478cedbece5fe1d859353e015d466aec800db87375fb58de50e0dbaf6af29a4a613e371695edda147dc74d33e82f3c13ee3bca1c6c5b5b0f5b3840b019fb658e2361b5004723f8e0b38faf7aac2c69f986b522cc97df5f4c570a02aa22d3d9a936c801e240f8d6fdaebfb1ed2dccaa4174abedef94042e8075c0eba26335c6e436f9288153c97e0643c1fc6021e27012c691f863290f80d62d3632a816d8275e7f23e8a2cccdcd3833a9a1237a6e5b3ffb8cce413aaf235fdb1734882df6abf0b67dc1f8f0275b84d3187c4309e99042adedeeee48192ae71938dbfb7de592e18149fbe6f1fb34b8f3f446a2fd23fc2ce30508c5eeda9fe042b0b986096ba32b37add930f60e0d58120cc8ba1e74bd7e53c05cd29db7776ac519c6d1003e630facd9b453a96f31e5cdb6e3bc428c7acfeedab4b5d28bb1a455474e66cd488b79991acc879b6f994fbbb4b2447c1fb271b41634bf4220b61d15f2a973846e1509790dd8efd58ff88ad6082647f9ae673446e7e940b0c7bde81ed101caa87b6f4d0d2e054beca04f4cde98eb155e4b45b314f28bb29f84b45aeb6eb049b4feed8a417083582e4c760a455e249daec5bb3cb7cdc76bd225cac106a78d8a0b2dbf207a5cb4c71c9066601de48570ba681a086ab9e49cdc233b71aee33b49e18446e64debef7e487c4854fd1341089169ea4ee399814f29b7b1ef96d4a158cc8ae508569f57892a42db1ed4efbac0569fa96cb0e5283a150c3aa0eef9a6d40abdf294c7613e4dd768d3255a5c3d81b84468692dc5d2f44bfdd6fb93d9c45a692b5a34a0a011d502f71e17a7d3d428fb19bd9e266911aa6e84cea89c1d734e64cf12fafda1d4031e23f9105354f407b9ef5b951731804dea2d6e486ab1b7903a94f9c9737efd7f2d8bdc3bb06c05eaf9e48e5e88d74b71a748b0ab841f490511c4da6814c9f3d2d5976567ea9be85d761df77340643d1b388d98cd1548084671886ff104b9af0764a9237881b794ba57b56f34cb684b48cc4a11db200887e8a5804c5001923b38655a297f32aa445c2c52970c78454f188ec952758a2fbb58e0b9c76a71cb3c4d1df6efe59937f81cc627c9e09425e091384da2b6350877e8b6019060e971de196270900db96a3dafbd9a00a082b5508667014fec5d3658bb674b25e9b328acc4f080b6c9f0da7cc27e66573e39a966ffb0a2d860c8605ade949e45f54bff9908b97cdde1b464d892c2214d66ba5a7472ba968dbf2a1a26f5451dfe076fcb852abd1b133cff4e6df91cb464e7a42733d00adf303282ffd2d232855e2779545fe6e041976b5f3664c524c3358e7f498835f38bb57b5a930e6ccb8b267180185313aa30186fd63b8f02f5d8bcb6d9edf960cf2292424a83823d35c7037c62d0b438e81b96f0740c1ee534eb3361438d45dabc19b415ede3f4f85a19dcd97dfc9e7d6404d498d3afcd6a1d9cf57f3839370f73e8b7f58c26c204498647443d48ecfd229faebf9aba793250d009fa19cd0ebb3c9ee13ff1f4b31f3403814d8b71349803af554dff9e3fea24529908833478d57ba16f4c9d9133484d636eaedd903390418bc1ac508320b07e3e0bf5da743aaf14f31dcbdb5b38e24fb5b615c7f9a74bda8dbbe81b679cde39ae862bcd41c0d0289317a715c4a9d72577e80588b5fd35c829f7d7055727cdecf02385918bffce6bafe93489d384c89437bd3230544ca759ed9c09d04e9bc85b27213da201653d41197983218dccc997eea22f34d66c27ebab5d42ae4f6d7c22c3258b53ad415b8098c61b10bd122fa90e54482b37601a7221819eb0d5406a16528d1c3dba17d70bfdd2eae0dcf53ef28c8df938e8419cb9966039ad21e019b9b8bb12ad8990b847347acec722a31eb29d210a8d55057315661d14e93651df71cc0ffa93da8ac2625624e07cbbf620a3ecbd0bd4bf8295cb6a87088496aef96f174402d3be226cdee342f7b5c76bd6b10e9ef467b98d9d1fa501d635190af67d4f5638cb17800e4d297a181e742203295f9739547905b050de5d07819287273d7cb622aeefb4add8a089bf376036bb6c32e56e852b93b84a48919e99616547eae29d788da4c6073de6acc623f644e0e55a2f9009282b2359555579d18f87e97efbd6465767a777061cdde0428122a00181eb9fe0b394229c18042651758336f3de9dd492b36c54a6289cdb32be420cf63dc30e3490cec208236ca8256fdeeb17af4266e7324810bf4bd8abbd2f5f16e1bd351de362c279d4de24efdbe607d70ae6ff6498d32fc28dca7b0af7dd2facf94da58cf73158efc736eef8904a2514bc986cf5440ccff57d8360132e469af880b75c824bc0bb450b8ca3ddb12ef9bca7bb09b8c27575c93b01e4f2cbe9383ffaff9ce2aaffb083bda3767ab65d5e4756c2681a6ecd4e8152c02afb99b4dad48bab2a94b3e180f639994dd9435810b4f97728c0e2bfdaa7ab67136df9d144b5fda0f7647234f0a095f8cfc82dbfd47d8e6b85fcd2caf953b771fc6b3e7a66ac6067005ffc549d6fa0fef3e338694f0f9024067c2adf81ffd2864c8dfad63e186eb011cd28de5bc64142316d2acd879e33187b660f9ace0fdb81a68d35f23876d9bade763d535934bb1d8e87fb2bab82da074889cb25bd42129bf934aced15b1e55e2f2a9cf8eda2e40e692ce0384845ff866ae2470e0863ec9920ced5868918a04992a4dd85a8888bdebd0e350f6054b03bc9090bdc790379865b6bff554dac5ac9c5970dc8e98b305816cd281cc9a90b0af92fbd34c212d9e284f335ad7d013313cd3cdaf0621aecd9c8af9147ae4aebcfaefe52d64e5fda7b9002a1ae2ec2c3986c8f7a705cfa4cac3e498604c8c10453d9c27cf2433dca0f10ed3c50c3fddd26a5da76d87b4a3114797efdc5a2a3291789af4fb002750f2abd2b436e25bb4176938ba7bd98cb486325e5ef5f1d28fa0b299e72efe699adee0955636eae6cf863a8858f3abd286431fb781dbddbb771b00035dde4cb605099fdd0081dcbad03c5a6283c5f47595b17c14ba92f24088f8232c1dd084c94ca81ea9ceb23443f83c3959f7315d111875941463eb371a0c7e3b079d7269668d464897a3d95254111e659ad6bcd564de29d753751072d5893592d5e6a3d8a7655ac630dab58c9c2f7b097f06115248948c7db143e5bc1399a9f081249aae5e09e4cedf7f62b3f2f014751f9be0e1b59ec7d5842319b6bd67dcd512e04ef3998fb309f0932be43c2c0a13684c22c7601e04189c74b9a971ac0454113a7c559cd0a5c0f1233d8992d4f53ab3d91d0a73b0f5d04008354231f336936764b826544335bd01eb733141ac9f2709bd362907b917cb6371537ec3dd77e607a4f888e7599619c39f383693c1e720ffc897b546c5e447c363a572d5cd10a42d108bd5f1ae0a8a4bb21e84792b9a1505b9f39cf8dd6fbee156972c17857fe2aa4394225ad922ee7773876294a5aa659edcd305a518562eb85a5e917ff49596f25d2291068e8dcd2222566b812b7c283ca5658df6e85bfd84446f49dc9496193deff6a7911226996b09ac77362832c44e697f23271bf5b5b2307567ff06bcb515dd6381294df48e858987f48c69f43645ef6ee7a6af111fec826fb684ecdbad0f3b8843f50e46435bf75c99ccb2d8e821b030adf45a7d30ba05ae22385fdfe52fe13df2f82b7a05fa6afb216e7b79ff9b0e6a87cb1f171a5562380f4196ea2b5ed8e169f5a8ba26af387d935ca637c58d653cbd2bf8912e09afe95279253a8225fad8cf164971b6fbfa45f136fd26596ea8fa089a77d058e941b3e10429ee240c24a86d27c7be051518318debadcff84b9dff76a8ade8ea70435142e9bfb5bdb37d29990abeb8333f4a271961ac5ef82ac841a836c7faa277c51496f4795ea8361d3a2eca9ef705bc3678b33218cde0106f4d07b016a64afd4640b683a4534a61b0c2d5a07d549d598b82d9891d7c578bd2a2c86f43155803a5fc5d7db1fcda1cf9c8064d016551fa920f0be5fff64aa3209dd0d8818bf78731a3703366b36a0cbc6e9eb7d9295ca02cb9a1224cd4ef8110c2f391c0010e391411b8993b408cefe9f204078e2917ad7156743b5baa526771905177f9c156ab58e1ff3f60fa490009bac99dc1c9825137398c377e6ffe5b32f55c700c19b1cf314c87e47d909dbe16cf4e5bd034e2445c72f59d9350e7e1324da0163f8321766897055b6383c7ad3426e6c03ec7bc79a879e504c0e0b5865b22605eeef67b96d4cd0ce682507c18a6ae43463142465496499dc29e9e645239aa230c3a5dd85c53529038a1fb7833a491a7e0e2f51dce84b8e56c3e19e22744c677fe069c1ce7b82cf2de2eb46ea4be73b946ed00477a5a017d88e9da397f7277befea8fef99669dbeb907c19243aa9c82ee30f1ae70123a8e998663af1c38bdf85aaad9edb8d1594b8b7ef01facce491ec31865e8687b118ae128d71967c4ec198a318ae059a1d37db5106f8b98dffb5955fbe4d1d4df7e2aeb208491c0930a7bf240af283880f6961ec07539fdf9935fd77fa12142cca52aaf36e6d2b9c18ae8a6d62ea8a547c6bc49c87ceafb0d2ac4358c0662259f3fbe3ab8339112cd9f142ef515cc16c630af31a4f4306a06f1a38b9d0a5f275ecd603fa0cdbcf2502bf48bb268a2b8808775dc7a0c29a890a96d1eaca3f62f09dd13e3df89a3706332b3a55c9cd65611fc7929511ebdd6f40ddc126b639cb671ec18eaf2d26df36f656aa71419f880c9ef105f6e7921056a9a1324de5aebb200f1d0df46e6c299387b18845894a183d41ea2c9debb0acb2966180030f4af8670fff2dd624368ddd6facf13f56ee523c840e86601f678e8034551e9a186aa8a7a9191ddb5751abda1bc09e16ebb5d44ef1682615657255d867cf5f985d67a2a041a08bbec0f6d4a0928cc7cd78f84b284e72ebe633fb4d159e1ca618867a97fbaae0971036da36115134244d2a27018b3bf33b54a5cc392ae7a38f14a8e3bdf895ff32618a3dae4995bb9a44c3827523b264ca719aaa99e5e4410b18e018ce880b0e14e11898b3ccd6baad117deba5db87932ca1c1c0477b2d19fb691d86471deb04dc6385c7722891b13cb02d31d0a0341ba810ffa93f85d539acdbb387e41e562cb394854be44a00ccbd6cabcdfb0e82af55afffd6afde253f926b3aa708ace627466aa7ddd7e1791e6f869f2c22a09402cd4c8a92eb4c4118f3ee4f9e58bc3df187703a58d70107e343b7990201028394a989e47b8c55a24ab39d31d2b6f7f7db008c506745d1a7fd6a0d2738e4c8350a686ab0bbb3b9428ece5e1c0f8ffc40ec957957da679bd736cfceb68c14b53386419e18e06835d6e693e28a3765097deaa5339dc1c569c296d79a073c7bbd5207db39c51a0d477f93339456d7bf3f866d5828eeb636b2847ebe7e036a6d3ae3cfaaacbfc84986691a137d77a04599d77b4ebfdae2ed116c70095cc5def2aa18de1f1ba68c67d142da6b0d662fb7bd863815b4fcbece32451de4d355df1ffc95a3f464571fd4fed0d2b777ac0ece88efc0dd5e4a36ecd3095f856c38a008286488cc6856754d18bf4a3515c06a83317222a1fa6359c9d192eb9a357dc7aae7ad43f86f125aaf80b24a3139664422101f919917f61e1f14072a804cd74a0ff", 0x1000}], 0x9, &(0x7f0000001980)=[@ip_retopts={{0x58, 0x0, 0x7, {[@generic={0x17, 0xe, "ca13e99136633be153c6e3c1"}, @generic={0x1, 0xf, "be0e5c0d8395f33cdce415198f"}, @rr={0x7, 0x3, 0x3f}, @noop, @rr={0x7, 0x17, 0x9, [@empty, @local, @remote, @remote, @multicast1]}, @generic={0x3a50f39dcd0376c0, 0xf, "69c2099baafc44750ac8ca20ff"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xc3}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_retopts={{0x40, 0x0, 0x7, {[@noop, @generic={0x0, 0xb, "18d02cff48c040dc4c"}, @ra={0x94, 0x6, 0xffffffff}, @generic={0x82, 0x4, "d9ce"}, @generic={0x44, 0x4, "0b9a"}, @rr={0x7, 0xf, 0xbd, [@dev={0xac, 0x14, 0x14, 0x1f}, @broadcast, @local]}, @end, @ra={0x94, 0x6, 0xffffffff}]}}}], 0xe0}}, {{&(0x7f00000003c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000003cc0)=[{&(0x7f0000001a80)="27fcde32d40ec422fc8added9ebfa6247911ac75d1a33a19392efaf0b4fb74dcd61d5f11460e87dbb0694a05d6fb", 0x2e}, {&(0x7f0000001ac0)="152b4bf754188ee95fc34439995caf3efe6f620288f10ca04de92ea92be9f957ac033f7749f5b2f8c7ada3c5a21fda3852a7a059257870db7f7628f34ad69da3a51b75277db36147c1a7cceba023f425f567e4172205071fbc5422a933f666dd67211c7c6586757d452fd2e82956cbc1cae40ea57f", 0x75}, {&(0x7f0000001b40)="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", 0x1000}, {&(0x7f0000002b40)="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", 0x1000}, {&(0x7f0000003b40)="1eb3c0230cf5c482d388cd800ca1f337cdc869ad1520fba5e71b98c5a0a437f225d54a8a3f27c7406218c0dcc194738282f38f11140a6ceeb873c21c1856437fa54b5a4ce1eb45b1c3c4adb4b4a6ce05d9af8cbd4fff90ad568eebb7821352e399f0ec63f63f00d55555a236bbe916006dcd2ff90ebbdbc95bd1e8e75a0a4f", 0x7f}, {&(0x7f0000003bc0)="d7c6291b67a8e76e1ef0dc27519aeac10d028c1936b23f7155ecd280994287f234aeba1511ef10922caa1580ecf6fcaab2fcd69f733fb469a1639e8a336750bcc0a2464c3163ff5234c2ae7b4112eac5f25cfdbe67d9de99ef5c2049d5ad4358144b606f3c63851290a73357ed6732d77a42ad4e450aeb263708ea07bffe7e04d42f0a6ca3a2ffa38f1dabe080e3a778bbee9b6dd3b228f9a67fa69ebe018d0ddbed18626c0b6001c2216a1627874c9b4e4bd98d812d0489ff743e58cfbcf2d977298d49b8c5e012354ff73b2bf66d0dbc0a4dc6b6c680ae95aabc2837e43e92a8dbf3da7bc81e", 0xe7}], 0x6, &(0x7f0000003e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_retopts={{0x54, 0x0, 0x7, {[@rr={0x7, 0x3, 0xc5}, @ra={0x94, 0x6, 0xfffffffe}, @timestamp={0x44, 0x2c, 0x5, 0x3, 0x4, [{[], 0xffffffff}, {[], 0x1}, {[@broadcast], 0x5}, {[], 0x5}, {[@remote], 0xa58}, {[], 0x5}, {[@initdev={0xac, 0x1e, 0x1, 0x0}], 0x1}]}, @ssrr={0x89, 0xf, 0x4, [@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7fff}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x2c, 0x0, 0x0, 0x6, [{[], 0x1}, {[], 0x6}, {[], 0x7fff}, {[], 0x4}, {[@dev={0xac, 0x14, 0x14, 0x17}], 0x4}, {[@dev={0xac, 0x14, 0x14, 0x25}], 0xfff}, {[@multicast2]}]}, @lsrr={0x83, 0xf, 0x3, [@remote, @multicast2, @dev={0xac, 0x14, 0x14, 0x2a}]}, @cipso={0x86, 0x36, 0x0, [{0x5, 0x10, "9722d3fdd20fe5344b17011768f2"}, {0x1, 0xe, "42975aba4aa92d31c8ff1248"}, {0x6, 0x8, "6005ada840bd"}, {0x1, 0xa, "36534a772fd1eda3"}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast1, @multicast2}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}], 0x148}}], 0x3, 0x20008000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2908.843570][ T5734] BPF:[1] Invalid btf_info:1040000 [ 2908.846346][ T5733] BPF:Unsupported section found 09:58:28 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x4000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2908.930427][ T5740] BPF:Unsupported section found [ 2908.937738][ T5738] BPF:[1] INT (anon) [ 2908.968915][ T5738] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) 09:58:28 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x8}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2908.985989][ T5738] BPF: [ 2908.994515][ T5738] BPF:vlen != 0 [ 2909.035898][ T5738] BPF: [ 2909.035898][ T5738] [ 2909.043218][ T5745] BPF:[1] DATASEC (anon) [ 2909.051297][ T5744] BPF:Unsupported section found [ 2909.058989][ T5745] BPF:size=0 vlen=0 [ 2909.068788][ T5745] BPF: [ 2909.076439][ T5745] BPF:vlen == 0 09:58:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2909.086547][ T5745] BPF: [ 2909.086547][ T5745] [ 2909.094028][ T5749] BPF:Unsupported section found [ 2909.095034][ T5748] BPF:[1] FUNC_PROTO (anon) [ 2909.117381][ T5751] BPF:[1] DATASEC (anon) [ 2909.126515][ T5748] BPF:return=0 args=( 09:58:29 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2909.135154][ T5751] BPF:size=0 vlen=0 [ 2909.143452][ T5748] BPF:16384 (anon) [ 2909.158056][ T5751] BPF: [ 2909.164765][ T5754] BPF:[1] Invalid btf_info:1080000 [ 2909.165586][ T5748] BPF:, 4 (invalid-name-offset) 09:58:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1800, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2909.190108][ T5751] BPF:vlen == 0 [ 2909.197808][ T5755] BPF:Unsupported section found [ 2909.204871][ T5751] BPF: [ 2909.204871][ T5751] [ 2909.217282][ T5759] BPF:Unsupported section found [ 2909.217494][ T5748] BPF:) [ 2909.226292][ T5758] BPF:[1] Invalid btf_info:1080000 09:58:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x8, &(0x7f0000000040)="0800b5225e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000040220f0000000000000c00000002000000000000000000000f0000000000"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) r1 = socket$netlink(0x10, 0x3, 0x13) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000640)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0xee360e08b963dea4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)={0x1d0, r2, 0x20005257a2dfa146, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff8c30}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bridge_slave_1\x00'}}]}, @TIPC_NLA_MEDIA={0xfc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x22}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd647}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x15f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffff7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x530}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x90}, 0x20000000) [ 2909.254810][ T5748] BPF: [ 2909.263621][ T5748] BPF:Invalid arg#1 [ 2909.279321][ T5748] BPF: [ 2909.279321][ T5748] [ 2909.281421][ T5761] BPF:[1] INT (anon) 09:58:29 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x10}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2909.310663][ T5761] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2909.320385][ T5762] BPF:[1] FUNC_PROTO (anon) [ 2909.325490][ T5761] BPF: [ 2909.328460][ T5761] BPF:vlen != 0 [ 2909.358519][ T5762] BPF:return=0 args=( [ 2909.372863][ T5761] BPF: [ 2909.372863][ T5761] [ 2909.392980][ T5762] BPF:16384 (anon) [ 2909.399930][ T5765] BPF:Invalid section offset [ 2909.410831][ T5762] BPF:, 4 (invalid-name-offset) [ 2909.428709][ T5769] BPF:Unsupported section found [ 2909.433850][ T5771] BPF:[1] Invalid btf_info:1100000 [ 2909.438295][ T5762] BPF:) 09:58:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:29 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:29 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x12}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2909.464663][ T5774] BPF:[1] Invalid btf_info:1100000 [ 2909.465377][ T5772] BPF:Unsupported section found [ 2909.482396][ T5773] BPF:Invalid section offset [ 2909.487791][ T5762] BPF: [ 2909.490613][ T5762] BPF:Invalid arg#1 [ 2909.549221][ T5762] BPF: [ 2909.549221][ T5762] 09:58:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") socket$isdn(0x22, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r2, r3, &(0x7f0000000000), 0xffe) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r4, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r4, 0x6628, 0x0) r5 = accept4$rose(r4, &(0x7f00000003c0)=@short={0xb, @remote, @netrom}, &(0x7f0000000440)=0x1c, 0x800) splice(r5, &(0x7f0000000300), r3, &(0x7f00000004c0)=0xffffffffffffffff, 0xfff, 0x7) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, 0x0, 0x7, 0x0, [], [{0x3, 0x2, 0x9, 0x6, 0x100, 0x1}, {0x1f, 0x1f, 0x7ff, 0xffffffffffffffff, 0x6, 0x400}], [[], [], [], [], [], [], []]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2909.596461][ T5782] BPF:[1] INT (anon) 09:58:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:29 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x4800}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2909.638946][ T5780] BPF:[1] Invalid btf_info:1120000 [ 2909.657409][ T5782] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2909.691406][ T5782] BPF: [ 2909.694313][ T5782] BPF:vlen != 0 [ 2909.700354][ T5784] BPF:Unsupported section found [ 2909.716836][ T5782] BPF: [ 2909.716836][ T5782] [ 2909.721155][ T5788] BPF:[1] Invalid btf_info:1120000 [ 2909.729077][ T5789] BPF:Unsupported section found [ 2909.786792][ T5794] BPF:Unsupported section found [ 2909.788285][ T5795] BPF:[1] FUNC_PROTO (anon) [ 2909.800179][ T5795] BPF:return=0 args=( [ 2909.808397][ T5795] BPF:18432 (anon) [ 2909.815949][ T5795] BPF:, 4 (invalid-name-offset) [ 2909.824876][ T5796] BPF:Unsupported section found [ 2909.829934][ T5795] BPF:) 09:58:29 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x0, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:29 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2909.837774][ T5795] BPF: [ 2909.846815][ T5797] BPF:[1] DATASEC (anon) [ 2909.857041][ T5795] BPF:Invalid arg#1 09:58:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x60, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2909.879808][ T5797] BPF:size=0 vlen=0 [ 2909.911474][ T5795] BPF: [ 2909.911474][ T5795] 09:58:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3f00, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2909.939562][ T5797] BPF: [ 2909.957222][ T5802] BPF:[1] FUNC_PROTO (anon) [ 2909.974121][ T5803] BPF:[1] INT (anon) [ 2909.985735][ T5802] BPF:return=0 args=( [ 2909.989379][ T5797] BPF:vlen == 0 [ 2910.002253][ T5802] BPF:18432 (anon) [ 2910.011113][ T5802] BPF:, 4 (invalid-name-offset) [ 2910.016085][ T5802] BPF:) [ 2910.018942][ T5802] BPF: [ 2910.021930][ T5803] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2910.041028][ T5802] BPF:Invalid arg#1 [ 2910.045606][ T5802] BPF: [ 2910.045606][ T5802] [ 2910.049446][ T5809] BPF:Unsupported section found [ 2910.061086][ T5797] BPF: [ 2910.061086][ T5797] [ 2910.066751][ T5808] BPF:[1] Invalid btf_info:1db0000 [ 2910.072709][ T5810] BPF:Unsupported section found [ 2910.073055][ T5803] BPF: [ 2910.083505][ T5811] BPF:Unsupported section found 09:58:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x4c00}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2910.088835][ T5812] BPF:Unsupported section found [ 2910.107976][ T5803] BPF:vlen != 0 [ 2910.112648][ T5813] BPF:[1] Invalid btf_info:1db0000 [ 2910.118347][ T5803] BPF: [ 2910.118347][ T5803] 09:58:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x0, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:30 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2910.281835][ T5820] BPF:[1] FUNC_PROTO (anon) [ 2910.300813][ T5823] BPF:Unsupported section found [ 2910.311150][ T5820] BPF:return=0 args=( [ 2910.338222][ T5820] BPF:19456 (anon) [ 2910.346747][ T5820] BPF:, 4 (invalid-name-offset) [ 2910.356200][ T5827] BPF:Unsupported section found [ 2910.361210][ T5820] BPF:) [ 2910.361219][ T5820] BPF: [ 2910.361226][ T5820] BPF:Invalid arg#1 [ 2910.361232][ T5820] BPF: [ 2910.361232][ T5820] [ 2910.362039][ T5826] BPF:[2] meta_left:4 meta_needed:12 [ 2910.364234][ T5828] BPF:Unsupported section found [ 2910.368468][ T5830] BPF:[1] FUNC_PROTO (anon) [ 2910.379305][ T5831] BPF:Unsupported section found [ 2910.398681][ T5830] BPF:return=0 args=( [ 2910.403696][ T5829] BPF:[1] INT (anon) [ 2910.404544][ T5832] BPF:[2] meta_left:4 meta_needed:12 [ 2910.414739][ T5829] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2910.421697][ T5830] BPF:19456 (anon) [ 2910.425587][ T5830] BPF:, 4 (invalid-name-offset) [ 2910.443887][ T5830] BPF:) [ 2910.458798][ T5830] BPF: [ 2910.464109][ T5830] BPF:Invalid arg#1 [ 2910.467677][ T5829] BPF: [ 2910.484130][ T5830] BPF: [ 2910.484130][ T5830] [ 2910.486799][ T5829] BPF:vlen != 0 [ 2910.534913][ T5829] BPF: [ 2910.534913][ T5829] 09:58:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000000f000000000000fcfeb68b7a989987bb059f825ce94389ec30c5f92459a875aa42a974ccbbb0191ba05a4ee8eca4be08e3eed081e8b8bba5f592381be07fa5c6ce6e16578f718fa3d7cb4cb12aeb848eadda10160e2cf09348950a05a9ad705f36ee536989558a0b3f94e9302c97b12807cb7896a77be2be297ed1ff0dc77515fd7546ed349ba3ee9269de2cbccfc4e3d85149675cdc165062cdb1b83d866eabc65ae984db1aa5a2e8435e245f730ba1e94b5cdbbf99699a5b3dbfef755c51b0297a4e47fde5108f763722ce6d366285d7b10a964a2541026a1fb873d92968e744ae0b7bba52bc90fa03204d3cb025c1000000"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0x4e, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x10, 0x200, 0x3, 0x7fffffff, 0x40, r1, 0xffff, [], 0x0, 0xffffffffffffffff, 0x3, 0x5}, 0x3c) 09:58:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2910.555837][ T5797] BPF:[1] DATASEC (anon) [ 2910.560240][ T5797] BPF:size=0 vlen=0 [ 2910.569341][ T5797] BPF: [ 2910.575994][ T5797] BPF:vlen == 0 [ 2910.584013][ T5797] BPF: [ 2910.584013][ T5797] 09:58:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:30 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0xc}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x6000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x0, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2910.696095][ T5842] BPF:Unsupported section found [ 2910.701262][ T5844] BPF:Unsupported section found [ 2910.706487][ T5841] BPF:[1] FUNC (anon) [ 2910.717104][ T5843] BPF:[1] FUNC_PROTO (anon) [ 2910.721649][ T5841] BPF:type_id=0 [ 2910.737683][ T5846] BPF:Unsupported section found [ 2910.745969][ T5841] BPF: [ 2910.755760][ T5841] BPF:Invalid name [ 2910.759747][ T5848] BPF:Unsupported section found [ 2910.762283][ T5843] BPF:return=0 args=( [ 2910.773800][ T5841] BPF: [ 2910.773800][ T5841] [ 2910.780841][ T5849] BPF:[1] INT (anon) [ 2910.787656][ T5843] BPF:24576 (anon) 09:58:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2910.796511][ T5849] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2910.797286][ T5843] BPF:, 4 (invalid-name-offset) [ 2910.812263][ T5850] BPF:[1] FUNC (anon) [ 2910.814511][ T5843] BPF:) [ 2910.825664][ T5850] BPF:type_id=0 [ 2910.826281][ T5843] BPF: [ 2910.837840][ T5843] BPF:Invalid arg#1 [ 2910.842261][ T5850] BPF: 09:58:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2910.844442][ T5843] BPF: [ 2910.844442][ T5843] [ 2910.848499][ T5849] BPF: [ 2910.856309][ T5850] BPF:Invalid name [ 2910.870953][ T5850] BPF: [ 2910.870953][ T5850] [ 2910.875976][ T5849] BPF:vlen != 0 [ 2910.914270][ T5849] BPF: [ 2910.914270][ T5849] [ 2910.923480][ T5853] BPF:[1] FUNC_PROTO (anon) [ 2910.927841][ T5854] BPF:Unsupported section found [ 2910.945155][ T5853] BPF:return=0 args=( 09:58:30 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0xd}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2910.970052][ T5853] BPF:24576 (anon) [ 2910.972559][ T5860] BPF:Unsupported section found [ 2910.982502][ T5859] BPF:[1] DATASEC (anon) [ 2910.994870][ T5853] BPF:, 4 (invalid-name-offset) 09:58:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2911.024544][ T5859] BPF:size=0 vlen=0 [ 2911.030777][ T5853] BPF:) [ 2911.039524][ T5853] BPF: 09:58:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2911.069421][ T5859] BPF: [ 2911.072678][ T5861] BPF:Unsupported section found [ 2911.079369][ T5859] BPF:vlen == 0 [ 2911.081366][ T5853] BPF:Invalid arg#1 [ 2911.087915][ T5853] BPF: [ 2911.087915][ T5853] [ 2911.101883][ T5866] BPF:[2] meta_left:4 meta_needed:12 [ 2911.121790][ T5869] BPF:Unsupported section found [ 2911.127130][ T5868] BPF:[2] meta_left:4 meta_needed:12 [ 2911.142913][ T5859] BPF: [ 2911.142913][ T5859] 09:58:31 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x6800}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2911.172116][ T5865] BPF:[1] DATASEC (anon) [ 2911.176503][ T5865] BPF:size=0 vlen=0 [ 2911.180329][ T5865] BPF: [ 2911.208023][ T5872] BPF:[1] INT (anon) [ 2911.212614][ T5865] BPF:vlen == 0 [ 2911.216539][ T5873] BPF:Unsupported section found 09:58:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="d8f8c600166e0d497d594d06829feb010018000000000000007a39e4a50c0000730fdb2b445a7f059edf383e6666aca1000000000000000000000f000000000000"], &(0x7f0000000700)=""/220, 0x41, 0xdc, 0x8}, 0x20) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000000c0)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x0, @empty, 0x4e20, 0x3, 'rr\x00', 0x19, 0x6, 0x4d}, 0x2c) 09:58:31 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2911.222549][ T5865] BPF: [ 2911.222549][ T5865] [ 2911.228941][ T5875] BPF:Unsupported section found [ 2911.256653][ T5872] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2911.300833][ T5872] BPF: [ 2911.321106][ T5872] BPF:vlen != 0 [ 2911.324737][ T5872] BPF: [ 2911.324737][ T5872] [ 2911.339642][ T5884] BPF:[1] FUNC_PROTO (anon) [ 2911.358568][ T5882] BPF:Unsupported section found [ 2911.360125][ T5884] BPF:return=0 args=( [ 2911.388760][ T5884] BPF:26624 (anon) [ 2911.397194][ T5884] BPF:, 4 (invalid-name-offset) [ 2911.411857][ T5887] BPF:Unsupported section found [ 2911.411860][ T5888] BPF:btf_header not found [ 2911.412563][ T5888] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:20000 [ 2911.427959][ T5884] BPF:) 09:58:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2911.435666][ T5892] BPF:Unsupported section found [ 2911.446276][ T5884] BPF: [ 2911.449429][ T5893] BPF:Unsupported section found [ 2911.477242][ T5884] BPF:Invalid arg#1 09:58:31 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2911.487739][ T5894] BPF:btf_header not found [ 2911.494314][ T5894] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:20000 [ 2911.500470][ T5884] BPF: [ 2911.500470][ T5884] 09:58:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2911.543602][ T5896] BPF:[1] FUNC_PROTO (anon) 09:58:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"/386], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000000)=0x70457b2aae8c6645, 0x4) 09:58:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xdb, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2911.581663][ T5896] BPF:return=0 args=( [ 2911.596529][ T5900] BPF:[1] INT (anon) [ 2911.621202][ T5900] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2911.654658][ T5900] BPF: [ 2911.668511][ T5896] BPF:26624 (anon) [ 2911.674400][ T5900] BPF:vlen != 0 09:58:31 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x4}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2911.696175][ T5907] BPF:Unsupported section found [ 2911.696657][ T5896] BPF:, 4 (invalid-name-offset) [ 2911.697796][ T5900] BPF: [ 2911.697796][ T5900] [ 2911.709396][ T5896] BPF:) [ 2911.720114][ T5910] BPF:Unsupported section found [ 2911.742839][ T5911] BPF:btf_header not found [ 2911.747605][ T5896] BPF: [ 2911.750425][ T5896] BPF:Invalid arg#1 [ 2911.756773][ T5913] BPF:Unsupported section found 09:58:31 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x6c00}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2911.789644][ T5896] BPF: [ 2911.789644][ T5896] [ 2911.795250][ T5915] BPF:Unsupported section found 09:58:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:31 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x8}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2911.922268][ T5922] BPF:[1] INT (anon) [ 2911.926293][ T5922] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2911.982805][ T5924] BPF:[1] FUNC_PROTO (anon) [ 2911.987487][ T5924] BPF:return=0 args=( [ 2911.999014][ T5928] BPF:Unsupported section found [ 2912.004754][ T5922] BPF: [ 2912.023751][ T5922] BPF:vlen != 0 [ 2912.029624][ T5924] BPF:27648 (anon) [ 2912.055203][ T5922] BPF: [ 2912.055203][ T5922] [ 2912.056863][ T5931] BPF:Unsupported section found [ 2912.068116][ T5932] BPF:Unsupported section found [ 2912.073911][ T5924] BPF:, 4 (invalid-name-offset) [ 2912.079322][ T5924] BPF:) [ 2912.096867][ T5924] BPF: [ 2912.098741][ T5935] BPF:Unsupported section found [ 2912.099764][ T5924] BPF:Invalid arg#1 09:58:32 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2912.121973][ T5924] BPF: [ 2912.121973][ T5924] [ 2912.138471][ T5937] BPF:[1] FUNC_PROTO (anon) [ 2912.143260][ T5937] BPF:return=0 args=( [ 2912.147344][ T5937] BPF:27648 (anon) [ 2912.157029][ T5937] BPF:, 4 (invalid-name-offset) [ 2912.162272][ T5937] BPF:) 09:58:32 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:32 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x10}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2912.177102][ T5937] BPF: [ 2912.182274][ T5937] BPF:Invalid arg#1 [ 2912.197436][ T5937] BPF: [ 2912.197436][ T5937] [ 2912.291344][ T5940] BPF:[1] INT (anon) [ 2912.295389][ T5940] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2912.310304][ T5943] BPF:Unsupported section found [ 2912.392348][ T5940] BPF: [ 2912.395206][ T5940] BPF:vlen != 0 [ 2912.395520][ T5952] BPF:Unsupported section found [ 2912.398674][ T5940] BPF: [ 2912.398674][ T5940] [ 2912.412192][ T5951] BPF:Unsupported section found [ 2912.419104][ T5953] BPF:Unsupported section found [ 2912.560805][ T5917] BPF:btf_header not found 09:58:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)='\x00'/11) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, r2, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e24}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4008e}, 0x4000) 09:58:32 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x12}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:32 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x7400}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:32 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:32 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xdb00, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2912.633214][ T5963] BPF:Unsupported section found [ 2912.646753][ T5969] BPF:[1] INT (anon) [ 2912.652655][ T5967] BPF:[1] FUNC_PROTO (anon) [ 2912.657319][ T5967] BPF:return=0 args=( [ 2912.660579][ T5969] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2912.669147][ T5970] BPF:Unsupported section found [ 2912.674504][ T5966] BPF:Unsupported section found 09:58:32 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2912.681345][ T5967] BPF:29696 (anon) [ 2912.693331][ T5969] BPF: [ 2912.694007][ T5971] BPF:Unsupported section found [ 2912.699448][ T5969] BPF:vlen != 0 [ 2912.705554][ T5967] BPF:, 4 (invalid-name-offset) [ 2912.706119][ T5969] BPF: [ 2912.706119][ T5969] [ 2912.721623][ T5967] BPF:) 09:58:32 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2912.734662][ T5967] BPF: 09:58:32 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2912.771324][ T5967] BPF:Invalid arg#1 [ 2912.781336][ T5967] BPF: [ 2912.781336][ T5967] [ 2912.799040][ T5976] BPF:[1] FUNC_PROTO (anon) 09:58:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2912.853221][ T5980] BPF:Unsupported section found [ 2912.875378][ T5976] BPF:return=0 args=( 09:58:32 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x334}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2912.903281][ T5976] BPF:29696 (anon) [ 2912.910359][ T5984] BPF:Unsupported section found [ 2912.916083][ T5982] BPF:[1] DATASEC (anon) [ 2912.933364][ T5982] BPF:size=0 vlen=0 [ 2912.933511][ T5976] BPF:, 4 (invalid-name-offset) [ 2912.944839][ T5986] BPF:[1] INT (anon) [ 2912.975836][ T5990] BPF:Unsupported section found [ 2912.981024][ T5976] BPF:) [ 2912.985210][ T5976] BPF: [ 2912.987548][ T5982] BPF: [ 2912.999943][ T5992] BPF:Unsupported section found [ 2913.003274][ T5982] BPF:vlen == 0 [ 2913.006244][ T5976] BPF:Invalid arg#1 [ 2913.015317][ T5986] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) 09:58:32 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2913.028404][ T5982] BPF: [ 2913.028404][ T5982] [ 2913.035573][ T5976] BPF: [ 2913.035573][ T5976] [ 2913.040701][ T5986] BPF: [ 2913.050179][ T5986] BPF:vlen != 0 [ 2913.054247][ T5986] BPF: [ 2913.054247][ T5986] [ 2913.151901][ T5998] BPF:Unsupported section found [ 2913.170299][ T6001] BPF:Unsupported section found 09:58:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x7a00}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:33 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x1200}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:33 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002110400000000000000000f000000000000"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) r1 = accept(r0, &(0x7f0000000080)=@ipx, &(0x7f0000000100)=0x80) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000240)=@sack_info={0x0, 0x8b0, 0x4}, &(0x7f0000000280)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000300)={r2, @in6={{0xa, 0x4e21, 0x8000, @empty, 0x1ff}}}, &(0x7f00000002c0)=0x84) [ 2913.465533][ T5991] BPF:[1] DATASEC (anon) [ 2913.470070][ T5991] BPF:size=0 vlen=0 [ 2913.474784][ T5991] BPF: [ 2913.477641][ T5991] BPF:vlen == 0 [ 2913.481193][ T5991] BPF: [ 2913.481193][ T5991] [ 2913.542031][ T6015] BPF:Unsupported section found [ 2913.542148][ T6009] BPF:[1] INT (anon) [ 2913.549449][ T6014] BPF:[1] FUNC_PROTO (anon) [ 2913.558071][ T6011] BPF:Unsupported section found [ 2913.564317][ T6014] BPF:return=0 args=( [ 2913.568846][ T6014] BPF:31232 (anon) [ 2913.572111][ T6016] BPF:Unsupported section found [ 2913.575171][ T6017] BPF:Unsupported section found [ 2913.583140][ T6014] BPF:, 4 (invalid-name-offset) [ 2913.588207][ T6014] BPF:) 09:58:33 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x3403}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2913.594634][ T6014] BPF: [ 2913.601260][ T6014] BPF:Invalid arg#1 [ 2913.606216][ T6009] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2913.614742][ T6014] BPF: [ 2913.614742][ T6014] 09:58:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1200, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2913.644639][ T6009] BPF: [ 2913.647524][ T6009] BPF:vlen != 0 [ 2913.650726][ T6019] BPF:[1] FUNC_PROTO (anon) [ 2913.671102][ T6019] BPF:return=0 args=( [ 2913.690263][ T6009] BPF: [ 2913.690263][ T6009] [ 2913.716190][ T6019] BPF:31232 (anon) [ 2913.733512][ T6019] BPF:, 4 (invalid-name-offset) [ 2913.754433][ T6019] BPF:) 09:58:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2913.763301][ T6028] BPF:Unsupported section found [ 2913.769201][ T6026] BPF:Unsupported section found [ 2913.782179][ T6019] BPF: 09:58:33 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x4000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2913.806681][ T6019] BPF:Invalid arg#1 [ 2913.814491][ T6030] BPF:Unsupported section found [ 2913.816487][ T6031] BPF:Unsupported section found [ 2913.825129][ T6019] BPF: [ 2913.825129][ T6019] 09:58:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0xda00}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2913.905832][ T6034] BPF:Total section length too long [ 2913.918623][ T6036] BPF:Total section length too long [ 2913.958360][ T6038] BPF:[1] INT (anon) [ 2913.992312][ T6038] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2913.999039][ T6038] BPF: 09:58:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000dc"], &(0x7f0000000080)=""/213, 0x26, 0xdc, 0x8}, 0x20) [ 2914.063556][ T6049] BPF:Unsupported section found [ 2914.070757][ T6051] BPF:Unsupported section found [ 2914.089797][ T6038] BPF:vlen != 0 [ 2914.089860][ T6050] BPF:[1] FUNC_PROTO (anon) [ 2914.103753][ T6053] BPF:Unsupported section found [ 2914.108813][ T6050] BPF:return=0 args=( 09:58:34 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0xdb00}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2914.115486][ T6054] BPF:Unsupported section found [ 2914.133975][ T6050] BPF:55808 (anon) [ 2914.134024][ T6038] BPF: [ 2914.134024][ T6038] [ 2914.158016][ T6050] BPF:, 4 (invalid-name-offset) 09:58:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:34 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3f00, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2914.182534][ T6050] BPF:) [ 2914.185795][ T6056] BPF:Invalid section offset [ 2914.198357][ T6050] BPF: [ 2914.199940][ T6061] BPF:Invalid section offset [ 2914.214380][ T6050] BPF:Invalid arg#1 [ 2914.227427][ T6050] BPF: [ 2914.227427][ T6050] 09:58:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2914.248087][ T6064] BPF:Unsupported section found [ 2914.253616][ T6065] BPF:[1] FUNC_PROTO (anon) [ 2914.262887][ T6065] BPF:return=0 args=( [ 2914.269240][ T6066] BPF:Unsupported section found [ 2914.273881][ T6065] BPF:55808 (anon) 09:58:34 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0xfffff}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb8c44568b53ec000000000c0000000c00000002000000000000000000000f00004f8098119061c7e9e5a4968fbdf35055130bf2ec9aa171f3a3cef4ee0ca8c73ca46b451ff5ebd4e4c86ac5df832534408af0e05995a9c22b38ac3600f42afcb304b2ceb03c259c010008608c363a3d7bfb6b33a43d3d0a8fd2cf881286641ba3c90a83d4e6998eeb09a59c04ae1ed82a55c67a80974064fb06d973a99eb094c8e2e696df52fd9959e0abe08f7d339fa6fd092ff214a18c9f948e0d726152078e000000"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "fb72b7cef886e3c9", "34ae1aca62809d3a4a5a66407952e27a00d1d6b712385f1f21acc47fa92a8ff1", "79db4944", "7c02da9e2c5c418e"}, 0x38) [ 2914.300176][ T6065] BPF:, 4 (invalid-name-offset) [ 2914.341311][ T6065] BPF:) 09:58:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2914.368216][ T6065] BPF: [ 2914.395876][ T6065] BPF:Invalid arg#1 [ 2914.399733][ T6065] BPF: [ 2914.399733][ T6065] [ 2914.402729][ T6076] BPF:Unsupported section found [ 2914.421534][ T6073] BPF:[1] INT (anon) [ 2914.436207][ T6073] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2914.457971][ T6080] BPF:btf_header not found [ 2914.462197][ T6073] BPF: [ 2914.469143][ T6082] BPF:Unsupported section found [ 2914.476589][ T6073] BPF:vlen != 0 [ 2914.481445][ T6076] BPF:Unsupported section found [ 2914.489805][ T6073] BPF: [ 2914.489805][ T6073] [ 2914.498319][ T6084] BPF:btf_header not found 09:58:34 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x400000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2914.504381][ T6085] BPF:Unsupported section found 09:58:34 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0xfffff}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:34 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x6628, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000080)=0x11048, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800b3b82e6fca05cc0000000000000c0000000c0000000200"/38], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000002c0), 0xfefe) sendfile(r3, r4, &(0x7f0000000000), 0xffe) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) accept$alg(r5, 0x0, 0x0) accept4(r5, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000180)=0x80, 0x1800) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r6, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0xc5821108}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)={0x80, r7, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x8, 0x1, [@TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3ff}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x82af}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x40}, 0x418d) 09:58:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:34 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x80ffff}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2914.710568][ T6097] BPF:[1] FUNC_PROTO (anon) [ 2914.754512][ T6099] BPF:[1] INT (anon) [ 2914.761137][ T6097] BPF:return=0 args=( [ 2914.783513][ T6101] BPF:Unsupported section found [ 2914.783547][ T6097] BPF:1048575 (anon) [ 2914.788536][ T6103] BPF:Unsupported section found [ 2914.797466][ T6099] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2914.818486][ T6106] BPF:Unsupported section found [ 2914.822731][ T6107] BPF:Unsupported section found [ 2914.827284][ T6097] BPF:, 4 (invalid-name-offset) [ 2914.832135][ T6099] BPF: [ 2914.846385][ T6097] BPF:) [ 2914.852316][ T6099] BPF:vlen != 0 [ 2914.855883][ T6099] BPF: [ 2914.855883][ T6099] [ 2914.856390][ T6097] BPF: 09:58:34 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2914.891485][ T6111] BPF:btf_header not found [ 2914.903293][ T6097] BPF:Invalid arg#1 [ 2914.907259][ T6097] BPF: [ 2914.907259][ T6097] 09:58:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:34 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0xffffff}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2914.960274][ T6113] BPF:[1] FUNC_PROTO (anon) [ 2915.018620][ T6115] BPF:Unsupported section found [ 2915.019152][ T6113] BPF:return=0 args=( [ 2915.045831][ T6113] BPF:1048575 (anon) [ 2915.067121][ T6121] BPF:[1] INT (anon) [ 2915.067800][ T6113] BPF:, 4 (invalid-name-offset) [ 2915.089096][ T6113] BPF:) [ 2915.089166][ T6122] BPF:Unsupported section found [ 2915.099329][ T6113] BPF: [ 2915.102654][ T6121] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2915.113551][ T6113] BPF:Invalid arg#1 09:58:35 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x1000000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:35 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:35 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0xffffff}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2915.121764][ T6125] BPF:Unsupported section found [ 2915.127976][ T6113] BPF: [ 2915.127976][ T6113] [ 2915.130848][ T6121] BPF: [ 2915.141115][ T6121] BPF:vlen != 0 [ 2915.147074][ T6127] BPF:Unsupported section found [ 2915.150288][ T6121] BPF: [ 2915.150288][ T6121] 09:58:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2915.283878][ T6132] BPF:Unsupported section found [ 2915.345593][ T6138] BPF:[1] INT (anon) [ 2915.368970][ T6138] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2915.380259][ T6141] BPF:Unsupported section found [ 2915.384999][ T6138] BPF: [ 2915.397640][ T6138] BPF:vlen != 0 [ 2915.412549][ T6142] BPF:[1] FUNC_PROTO (anon) [ 2915.418793][ T6138] BPF: [ 2915.418793][ T6138] [ 2915.435480][ T6144] BPF:Unsupported section found [ 2915.457232][ T6142] BPF:return=0 args=( [ 2915.470299][ T6146] BPF:Unsupported section found [ 2915.473115][ T6142] BPF:16777215 (anon) [ 2915.489523][ T6142] BPF:, 4 (invalid-name-offset) [ 2915.495962][ T6142] BPF:) [ 2915.499497][ T6142] BPF: [ 2915.502850][ T6142] BPF:Invalid arg#1 [ 2915.506985][ T6142] BPF: [ 2915.506985][ T6142] [ 2915.556744][ T6111] BPF:btf_header not found [ 2915.566346][ T6149] BPF:[1] FUNC_PROTO (anon) [ 2915.585413][ T6149] BPF:return=0 args=( [ 2915.592547][ T6149] BPF:16777215 (anon) [ 2915.597647][ T6149] BPF:, 4 (invalid-name-offset) [ 2915.603062][ T6149] BPF:) 09:58:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:35 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x2000000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:35 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2915.606018][ T6149] BPF: [ 2915.608887][ T6149] BPF:Invalid arg#1 [ 2915.621329][ T6149] BPF: [ 2915.621329][ T6149] 09:58:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:35 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") epoll_create1(0x80000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r2, r3, &(0x7f0000000000), 0xffe) ioctl(r2, 0x1ff, &(0x7f0000000100)="c031259a506c96918a502bfc26314e3510b54bbe27b9b713ad8a9aed40e8b657cdc56047928061b9deb70f843139699348f7cd0e9a99913a8333d94b2b9c9a969854b8dbbfc8fe40d801844ae3c445e1b0e74bd01f47d1c23392090c92725e58a1342f35e32911fa8958229eda876c39cc9b2f932c936955b11326a1acb7460d65139751811c3298eab6f6") setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000800)={'filter\x00', 0x7, 0x4, 0x480, 0x258, 0x140, 0x140, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000040), {[{{@arp={@loopback, @empty, 0x0, 0xffffff00, @empty, {[0x1fe, 0xff, 0xff, 0x0, 0x0, 0x101]}, @empty, {[0xff, 0x0, 0x101, 0x0, 0x0, 0xff]}, 0x4000, 0x2801, 0x4, 0x1, 0x81, 0x7, 'bpq0\x00', 'veth0_to_bond\x00', {}, {}, 0x0, 0x10}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local, @empty, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x1, 0x7fffffff}}}, {{@arp={@empty, @multicast2, 0xffffff00, 0x0, @empty, {[0xff, 0xd9becc24ef4d0ac6, 0x0, 0xff, 0x7f, 0x7f]}, @mac=@broadcast, {[0x0, 0x0, 0x0, 0x0, 0xff, 0x101]}, 0xfff7, 0x8, 0x458, 0x8, 0xffff, 0x8000, 'nlmon0\x00', 'lo\x00', {0xff}, {0xda4a2d3c441234d8}, 0x0, 0x1}, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@arp={@remote, @multicast2, 0xffffffff, 0xff, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, {[0x0, 0x0, 0x1fe, 0x0, 0xff]}, @empty, {[0x0, 0x8bcd155c20e0009f, 0x7f, 0x0, 0x80, 0xff]}, 0x8, 0x6, 0x40, 0xeb, 0x4, 0x1ff, 'hwsim0\x00', 'erspan0\x00', {0x101}, {0xff}, 0x0, 0x2b8}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @remote, @broadcast, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4d0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xffffffffffffffc8, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf, 0x0, 0x0, [{0x6, 0x3, 0x40}, {0xd, 0x1, 0x40001}, {0xf, 0x5, 0xe15}, {0x7, 0x4, 0x20}]}]}}, &(0x7f0000000700)=""/219, 0x26, 0xdc, 0x8}, 0x20) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) accept$alg(r4, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x0, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f00000001c0)={0x0, 0x4a3f, &(0x7f0000000180)={&(0x7f0000000380)={0x38, r6, 0x105, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_NODES(r5, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x1c, r6, 0x100, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800c}, 0x10) ioctl$int_out(r4, 0x10aa4781a23dad22, &(0x7f00000001c0)) [ 2915.683235][ T6153] BPF:[1] INT (anon) [ 2915.696137][ T6157] BPF:Unsupported section found [ 2915.704427][ T6153] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2915.709891][ T6159] BPF:Unsupported section found [ 2915.713382][ T6161] BPF:Unsupported section found 09:58:35 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x1000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:35 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x4000000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2915.732366][ T6162] BPF:Unsupported section found [ 2915.738602][ T6153] BPF: [ 2915.744090][ T6153] BPF:vlen != 0 [ 2915.747691][ T6153] BPF: [ 2915.747691][ T6153] [ 2915.829954][ T6166] BPF:[1] FUNC_PROTO (anon) 09:58:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xf000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2915.854404][ T6166] BPF:return=0 args=( 09:58:35 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2915.891039][ T6166] BPF:16777216 (anon) [ 2915.895081][ T6166] BPF:, 4 (invalid-name-offset) [ 2915.900093][ T6166] BPF:) 09:58:35 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x8000000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2915.941964][ T6171] BPF:Total section length too long [ 2915.985230][ T6175] BPF:Unsupported section found [ 2915.992225][ T6171] Started in network mode [ 2916.027047][ T6171] Own node identity , cluster identity 4711 [ 2916.033655][ T6166] BPF: [ 2916.037013][ T6182] BPF:Unsupported section found [ 2916.046778][ T6166] BPF:Invalid arg#1 [ 2916.058842][ T6185] BPF:Unsupported section found [ 2916.065601][ T6187] BPF:[1] INT (anon) [ 2916.069694][ T6187] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2916.090492][ T6171] Failed to obtain node identity [ 2916.096305][ T6171] Enabling of bearer rejected, failed to enable media [ 2916.101563][ T6187] BPF: [ 2916.109451][ T6187] BPF:vlen != 0 [ 2916.113540][ T6185] BPF:Unsupported section found [ 2916.121385][ T6166] BPF: [ 2916.121385][ T6166] [ 2916.126091][ T6187] BPF: [ 2916.126091][ T6187] [ 2916.133655][ T6190] BPF:[1] FUNC_PROTO (anon) 09:58:36 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x10000000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x18000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2916.138982][ T6191] BPF:Total section length too long [ 2916.148593][ T6190] BPF:return=0 args=( [ 2916.156454][ T6188] Started in network mode [ 2916.162205][ T6190] BPF:16777216 (anon) [ 2916.177074][ T6188] Own node identity , cluster identity 4711 [ 2916.186218][ T6190] BPF:, 4 (invalid-name-offset) 09:58:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2916.197931][ T6188] Failed to obtain node identity [ 2916.204400][ T6190] BPF:) [ 2916.210686][ T6190] BPF: [ 2916.216018][ T6188] Enabling of bearer rejected, failed to enable media 09:58:36 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2916.254443][ T6190] BPF:Invalid arg#1 [ 2916.282340][ T6190] BPF: [ 2916.282340][ T6190] [ 2916.295168][ T6197] BPF:Unsupported section found 09:58:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="c1eb0100180000afbc5e996d1c913f13ef00000000000c0000000c00000002000000000000000000006cf3b4e00000006f7c5e7721009a3abbc0d0fb74059fccf3d7c0c9008efac234b14ad83cd0738ae606615979e7203d327543edd067e356691c0e95c48554fabf"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:58:36 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:36 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x12000000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2916.349547][ T6205] BPF:Unsupported section found [ 2916.355647][ T6203] BPF:[1] INT (anon) [ 2916.361563][ T6201] BPF:Unsupported section found [ 2916.391224][ T6203] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2916.398301][ T6203] BPF: [ 2916.401882][ T6207] BPF:Unsupported section found [ 2916.441596][ T6203] BPF:vlen != 0 [ 2916.457308][ T6203] BPF: [ 2916.457308][ T6203] [ 2916.471373][ T6211] BPF:btf_header not found 09:58:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x20000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2916.497947][ T6213] BPF:[1] FUNC_PROTO (anon) [ 2916.503955][ T6216] BPF:btf_header not found 09:58:36 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:58:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2916.542007][ T6213] BPF:return=0 args=( [ 2916.566971][ T6213] BPF:33554432 (anon) 09:58:36 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x34030000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2916.601595][ T6220] BPF:Unsupported section found 09:58:36 executing program 5: r0 = socket(0xa, 0x3, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000480)={r4}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000002700)={r4, 0xcc, &(0x7f0000002600)=[@in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e22, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}, @in6={0xa, 0x4e24, 0x200, @ipv4={[], [], @remote}, 0x200}, @in6={0xa, 0x4e24, 0x10000, @remote, 0x1}, @in={0x2, 0x4e20, @empty}, @in6={0xa, 0x4e20, 0x2, @mcast2, 0x1}, @in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0xfffffffd, @ipv4={[], [], @multicast1}, 0x9}]}, &(0x7f0000002740)=0x10) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000002780)=@assoc_id=r5, 0x4) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r6, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) [ 2916.622858][ T6213] BPF:, 4 (invalid-name-offset) [ 2916.647061][ T6226] BPF:Unsupported section found [ 2916.659616][ T6213] BPF:) [ 2916.673233][ T6213] BPF: [ 2916.687398][ T6213] BPF:Invalid arg#1 09:58:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3f000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2916.710077][ T6213] BPF: [ 2916.710077][ T6213] [ 2916.715889][ T6227] BPF:Unsupported section found [ 2916.731186][ T6231] BPF:Unsupported section found [ 2916.759273][ T6236] BPF:[1] FUNC_PROTO (anon) 09:58:36 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:58:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2916.808524][ T6239] BPF:Unsupported section found [ 2916.821117][ T6236] BPF:return=0 args=( [ 2916.845195][ T6236] BPF:33554432 (anon) 09:58:36 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x40000000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2916.858411][ T6243] BPF:Unsupported section found [ 2916.877268][ T6236] BPF:, 4 (invalid-name-offset) [ 2916.907241][ T6236] BPF:) [ 2916.915137][ T6242] BPF:[1] DATASEC (anon) [ 2916.936719][ T6236] BPF: [ 2916.944047][ T6236] BPF:Invalid arg#1 [ 2916.948066][ T6236] BPF: [ 2916.948066][ T6236] 09:58:36 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 2916.968447][ T6242] BPF:size=0 vlen=0 [ 2916.975694][ T6248] BPF:Unsupported section found [ 2916.998240][ T6250] BPF:Unsupported section found [ 2916.999533][ T6242] BPF: 09:58:37 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x3000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x40000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2917.065610][ T6242] BPF:vlen == 0 09:58:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xdb00, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2917.097053][ T6242] BPF: [ 2917.097053][ T6242] [ 2917.109787][ T6257] BPF:Unsupported section found [ 2917.135938][ T6260] BPF:[1] FUNC_PROTO (anon) 09:58:37 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0xdb000000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000700)=""/220, 0x0, 0xdc, 0x8}, 0x20) [ 2917.161138][ T6260] BPF:return=0 args=( [ 2917.176090][ T6260] BPF:50331648 (anon) [ 2917.186699][ T6263] BPF:Unsupported section found [ 2917.224495][ T6260] BPF:, 4 (invalid-name-offset) [ 2917.248658][ T6260] BPF:) 09:58:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2917.273744][ T6267] BPF:Unsupported section found [ 2917.282038][ T6260] BPF: [ 2917.290782][ T6260] BPF:Invalid arg#1 [ 2917.296257][ T6271] BPF:Unsupported section found [ 2917.302821][ T6260] BPF: [ 2917.302821][ T6260] [ 2917.339139][ T6273] BPF:[1] FUNC_PROTO (anon) [ 2917.364723][ T6273] BPF:return=0 args=( [ 2917.370220][ T6275] BPF:hdr_len not found [ 2917.387655][ T6273] BPF:50331648 (anon) [ 2917.404931][ T6273] BPF:, 4 (invalid-name-offset) [ 2917.425279][ T6277] BPF:Unsupported section found [ 2917.436338][ T6273] BPF:) [ 2917.439223][ T6273] BPF: [ 2917.454700][ T6273] BPF:Invalid arg#1 [ 2917.458641][ T6273] BPF: [ 2917.458641][ T6273] [ 2917.464577][ T6280] BPF:Unsupported section found [ 2917.554544][ T6242] BPF:[1] DATASEC (anon) [ 2917.559579][ T6242] BPF:size=0 vlen=0 [ 2917.563797][ T6242] BPF: [ 2917.566656][ T6242] BPF:vlen == 0 [ 2917.570206][ T6242] BPF: [ 2917.570206][ T6242] 09:58:37 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0000000000000c0000000c00000002000000000000000000000f000000000000"], &(0x7f0000000700)=""/220, 0x26, 0xdc, 0x8}, 0x20) 09:58:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:37 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0xe4ffffff}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000700)=""/220, 0x0, 0xdc, 0x8}, 0x20) 09:58:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:37 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x4000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2917.622449][ T6285] BPF:Unsupported section found 09:58:37 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0xffff0f00}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2917.651749][ T6291] BPF:[1] FUNC_PROTO (anon) [ 2917.657569][ T6291] BPF:return=0 args=( [ 2917.660002][ T6294] BPF:Unsupported section found [ 2917.666785][ T6295] BPF:Unsupported section found [ 2917.668269][ T6293] BPF:hdr_len not found [ 2917.678700][ T6296] BPF:Unsupported section found [ 2917.682371][ T6291] BPF:67108864 (anon) [ 2917.691363][ T6291] BPF:, 4 (invalid-name-offset) [ 2917.696242][ T6291] BPF:) 09:58:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2917.727547][ T6291] BPF: [ 2917.756649][ T6291] BPF:Invalid arg#1 09:58:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x60000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000700)=""/220, 0x0, 0xdc, 0x8}, 0x20) [ 2917.798270][ T6291] BPF: [ 2917.798270][ T6291] [ 2917.851557][ T6306] BPF:[1] FUNC_PROTO (anon) [ 2917.856205][ T6306] BPF:return=0 args=( [ 2917.860195][ T6306] BPF:67108864 (anon) [ 2917.869878][ T6305] BPF:Unsupported section found [ 2917.881155][ T6308] BPF:Invalid magic [ 2917.886439][ T6310] BPF:Invalid magic 09:58:37 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0xffff8000}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2917.909077][ T6311] BPF:Unsupported section found [ 2917.929041][ T6306] BPF:, 4 (invalid-name-offset) [ 2917.934511][ T6312] BPF:Unsupported section found 09:58:37 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) accept$alg(r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f00000002c0)=ANY=[@ANYPTR, @ANYRES64=r2, @ANYRESDEC, @ANYBLOB="dbcda6064a9d0e95f045956fb2290f8f7c55c7c99960edf8532339b9295176082f07c024b2336f6d27777cc7416b8094e21f97282c649972f68eb445693d77508dbb9a6d96673153f6919ccb731f8edda5051c3bbff6681807e43fbf18ec8c1d21b10d59b9a8092bae5d00ca412f29aa6538a790624dab41e5649cd6ba3f7e91817594ed866ba7d3d2bca12d746afbaa511f8513c208c7af87c0", @ANYRES32=r0, @ANYPTR]], &(0x7f0000000080)=""/220, 0x26, 0xfb, 0x8}, 0x20) [ 2917.968817][ T6315] BPF:hdr_len not found [ 2917.979797][ T6306] BPF:) [ 2917.993576][ T6306] BPF: [ 2917.997983][ T6318] BPF:Unsupported section found 09:58:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2918.015842][ T6306] BPF:Invalid arg#1 [ 2918.019698][ T6306] BPF: [ 2918.019698][ T6306] 09:58:38 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:38 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0xffffff00}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2918.123160][ T6325] BPF:Invalid magic 09:58:38 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x5000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000700)=""/220, 0x1a, 0xdc, 0x8}, 0x20) [ 2918.156958][ T6326] BPF:Unsupported section found [ 2918.164358][ T6328] BPF:Unsupported section found [ 2918.171752][ T6325] BPF:Invalid magic [ 2918.248440][ T6334] BPF:No type found [ 2918.271502][ T6336] BPF:Unsupported section found 09:58:38 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:38 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2918.301511][ T6341] BPF:Unsupported section found 09:58:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000700)=""/220, 0x1a, 0xdc, 0x8}, 0x20) [ 2918.353515][ T6344] BPF:[1] FUNC_PROTO (anon) [ 2918.358181][ T6344] BPF:return=0 args=( 09:58:38 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0xffffffe4}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2918.394592][ T6346] BPF:Unsupported section found 09:58:38 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2918.422502][ T6350] BPF:Unsupported section found [ 2918.431629][ T6344] BPF:83886080 (anon) [ 2918.437521][ T6348] BPF:[1] INT (anon) [ 2918.458275][ T6348] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2918.458431][ T6352] BPF:No type found [ 2918.465081][ T6344] BPF:, 4 (invalid-name-offset) [ 2918.465087][ T6344] BPF:) [ 2918.465093][ T6344] BPF: [ 2918.465100][ T6344] BPF:Invalid arg#1 [ 2918.465107][ T6344] BPF: [ 2918.465107][ T6344] [ 2918.491191][ T6348] BPF: [ 2918.504333][ T6354] BPF:[1] FUNC_PROTO (anon) [ 2918.505882][ T6348] BPF:vlen != 0 09:58:38 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2918.526780][ T6354] BPF:return=0 args=( [ 2918.533318][ T6354] BPF:83886080 (anon) [ 2918.540686][ T6354] BPF:, 4 (invalid-name-offset) [ 2918.557154][ T6348] BPF: [ 2918.557154][ T6348] [ 2918.565852][ T6354] BPF:) 09:58:38 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2918.580415][ T6354] BPF: 09:58:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000700)=""/220, 0x1a, 0xdc, 0x8}, 0x20) [ 2918.638375][ T6354] BPF:Invalid arg#1 [ 2918.650832][ T6360] BPF:Unsupported section found [ 2918.661326][ T6354] BPF: [ 2918.661326][ T6354] [ 2918.673420][ T6364] BPF:Unsupported section found [ 2918.682447][ T6365] BPF:Unsupported section found [ 2918.698129][ T6367] BPF:Unsupported section found 09:58:38 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2918.730526][ T6370] BPF:No type found 09:58:38 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x6000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:38 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, 0x0, 0x2a, 0x0, 0x8}, 0x20) 09:58:38 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:38 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2918.881021][ T6377] BPF:[1] INT (anon) [ 2918.885092][ T6377] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2918.923307][ T6380] BPF:[1] FUNC_PROTO (anon) [ 2918.931047][ T6380] BPF:return=0 args=( [ 2918.951298][ T6377] BPF: [ 2918.959934][ T6380] BPF:100663296 (anon) [ 2918.965528][ T6377] BPF:vlen != 0 [ 2918.972093][ T6386] BPF:Unsupported section found [ 2918.978955][ T6377] BPF: [ 2918.978955][ T6377] [ 2918.988309][ T6389] BPF:[1] INT (anon) [ 2918.998339][ T6380] BPF:, 4 (invalid-name-offset) [ 2919.004516][ T6389] BPF:size=0 bits_offset=0 nr_bits=2 encoding=(none) [ 2919.005092][ T6391] BPF:Unsupported section found 09:58:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, 0x0, 0x2a, 0x0, 0x8}, 0x20) [ 2919.021705][ T6390] BPF:Unsupported section found [ 2919.029985][ T6389] BPF: [ 2919.036479][ T6389] BPF:nr_bits exceeds type_size [ 2919.062473][ T6380] BPF:) [ 2919.066039][ T6393] BPF:Unsupported section found [ 2919.066718][ T6389] BPF: 09:58:39 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2919.066718][ T6389] 09:58:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2919.101192][ T6380] BPF: [ 2919.106818][ T6395] BPF:[1] INT (anon) [ 2919.125304][ T6380] BPF:Invalid arg#1 09:58:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2919.151846][ T6380] BPF: [ 2919.151846][ T6380] [ 2919.169803][ T6395] BPF:size=0 bits_offset=0 nr_bits=2 encoding=(none) [ 2919.185331][ T6401] BPF:[1] FUNC_PROTO (anon) [ 2919.190746][ T6400] BPF:[1] INT (anon) 09:58:39 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, 0x0, 0x2a, 0x0, 0x8}, 0x20) [ 2919.220990][ T6400] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2919.227702][ T6400] BPF: [ 2919.231062][ T6401] BPF:return=0 args=( [ 2919.235073][ T6401] BPF:100663296 (anon) [ 2919.241088][ T6395] BPF: [ 2919.244221][ T6395] BPF:nr_bits exceeds type_size [ 2919.250518][ T6400] BPF:vlen != 0 [ 2919.254826][ T6400] BPF: [ 2919.254826][ T6400] [ 2919.259244][ T6395] BPF: [ 2919.259244][ T6395] [ 2919.261073][ T6401] BPF:, 4 (invalid-name-offset) [ 2919.266201][ T6404] BPF:Unsupported section found [ 2919.282037][ T6401] BPF:) [ 2919.284959][ T6401] BPF: [ 2919.303990][ T6407] BPF:Unsupported section found 09:58:39 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x4}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:39 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x7000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2919.318735][ T6408] BPF:Unsupported section found [ 2919.336928][ T6401] BPF:Invalid arg#1 [ 2919.349308][ T6401] BPF: [ 2919.349308][ T6401] [ 2919.361727][ T6411] BPF:Unsupported section found 09:58:39 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc}, 0x20) 09:58:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xdb000000, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2919.487742][ T6417] BPF:[1] INT (anon) [ 2919.504197][ T6421] BPF:[1] INT (anon) [ 2919.518982][ T6417] BPF:size=0 bits_offset=0 nr_bits=4 encoding=(none) [ 2919.559410][ T6421] BPF:size=0 bits_offset=0 nr_bits=0 encoding=(none) [ 2919.585146][ T6427] BPF:Unsupported section found [ 2919.588147][ T6417] BPF: [ 2919.593732][ T6417] BPF:nr_bits exceeds type_size [ 2919.597588][ T6421] BPF: [ 2919.601595][ T6426] BPF:[1] FUNC_PROTO (anon) 09:58:39 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc}, 0x20) [ 2919.606196][ T6426] BPF:return=0 args=( [ 2919.606356][ T6417] BPF: [ 2919.606356][ T6417] [ 2919.610170][ T6426] BPF:117440512 (anon) [ 2919.610181][ T6426] BPF:, 4 (invalid-name-offset) [ 2919.610187][ T6426] BPF:) [ 2919.610192][ T6426] BPF: [ 2919.610200][ T6426] BPF:Invalid arg#1 [ 2919.610205][ T6426] BPF: [ 2919.610205][ T6426] [ 2919.616148][ T6421] BPF:vlen != 0 [ 2919.628881][ T6429] BPF:Invalid section offset [ 2919.638840][ T6430] BPF:Unsupported section found [ 2919.650397][ T6431] BPF:[1] INT (anon) [ 2919.658958][ T6431] BPF:size=0 bits_offset=0 nr_bits=4 encoding=(none) [ 2919.663064][ T6421] BPF: [ 2919.663064][ T6421] [ 2919.676842][ T6432] BPF:Invalid section offset [ 2919.681999][ T6433] BPF:[1] FUNC_PROTO (anon) [ 2919.698793][ T6431] BPF: 09:58:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2919.706495][ T6433] BPF:return=0 args=( [ 2919.708574][ T6431] BPF:nr_bits exceeds type_size [ 2919.710507][ T6433] BPF:117440512 (anon) [ 2919.710519][ T6433] BPF:, 4 (invalid-name-offset) [ 2919.710525][ T6433] BPF:) [ 2919.710532][ T6433] BPF: [ 2919.710540][ T6433] BPF:Invalid arg#1 [ 2919.710546][ T6433] BPF: [ 2919.710546][ T6433] 09:58:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:58:39 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x8000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff00, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2919.809890][ T6438] BPF:Unsupported section found [ 2919.817457][ T6439] BPF:Unsupported section found 09:58:39 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc}, 0x20) [ 2919.861066][ T6431] BPF: [ 2919.861066][ T6431] 09:58:39 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x8}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2919.981779][ T6447] BPF:[1] FUNC_PROTO (anon) [ 2919.986424][ T6447] BPF:return=0 args=( [ 2919.990419][ T6447] BPF:134217728 (anon) [ 2919.998190][ T6452] BPF:Invalid section offset 09:58:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 2920.035763][ T6447] BPF:, 4 (invalid-name-offset) [ 2920.035807][ T6456] BPF:Invalid section offset [ 2920.040776][ T6447] BPF:) [ 2920.048353][ T6447] BPF: [ 2920.052107][ T6447] BPF:Invalid arg#1 [ 2920.056058][ T6447] BPF: [ 2920.056058][ T6447] [ 2920.069412][ T6455] BPF:Unsupported section found [ 2920.083182][ T6458] BPF:[1] FUNC_PROTO (anon) 09:58:40 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) 09:58:40 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2920.112524][ T6458] BPF:return=0 args=( [ 2920.119012][ T6462] BPF:Unsupported section found [ 2920.138420][ T6458] BPF:134217728 (anon) [ 2920.154310][ T6458] BPF:, 4 (invalid-name-offset) [ 2920.180102][ T6458] BPF:) 09:58:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2920.200401][ T6458] BPF: [ 2920.203581][ T6461] BPF:[1] INT (anon) [ 2920.208024][ T6461] BPF:size=0 bits_offset=0 nr_bits=8 encoding=(none) [ 2920.220399][ T6458] BPF:Invalid arg#1 [ 2920.227039][ T6468] BPF:[1] DATASEC (anon) [ 2920.232691][ T6458] BPF: [ 2920.232691][ T6458] [ 2920.239941][ T6468] BPF:size=0 vlen=6 [ 2920.252214][ T6461] BPF: [ 2920.259695][ T6468] BPF: [ 2920.265008][ T6461] BPF:nr_bits exceeds type_size [ 2920.273474][ T6468] BPF:size == 0 [ 2920.284448][ T6461] BPF: [ 2920.284448][ T6461] [ 2920.289772][ T6470] BPF:Unsupported section found 09:58:40 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0xa000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 2920.301417][ T6468] BPF: [ 2920.301417][ T6468] [ 2920.329368][ T6473] BPF:Unsupported section found [ 2920.342844][ T6474] BPF:[1] INT (anon) [ 2920.346955][ T6474] BPF:size=0 bits_offset=0 nr_bits=8 encoding=(none) [ 2920.372328][ T6475] BPF:Unsupported section found 09:58:40 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) 09:58:40 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2920.395891][ T6474] BPF: [ 2920.414125][ T6474] BPF:nr_bits exceeds type_size [ 2920.418725][ T6478] BPF:[1] FUNC_PROTO (anon) [ 2920.428826][ T6481] BPF:Unsupported section found [ 2920.441086][ T6474] BPF: [ 2920.441086][ T6474] [ 2920.463762][ T6478] BPF:return=0 args=( [ 2920.484419][ T6478] BPF:167772160 (anon) 09:58:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000700)=""/220, 0x0, 0xdc, 0x8}, 0x20) 09:58:40 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x10}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2920.521019][ T6478] BPF:, 4 (invalid-name-offset) 09:58:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x12000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2920.544270][ T6486] BPF:[1] DATASEC (anon) [ 2920.554080][ T6478] BPF:) [ 2920.559080][ T6478] BPF: [ 2920.565813][ T6486] BPF:size=0 vlen=6 [ 2920.586754][ T6486] BPF: [ 2920.590395][ T6488] BPF:Section overlap found [ 2920.601388][ T6478] BPF:Invalid arg#1 [ 2920.602260][ T6486] BPF:size == 0 [ 2920.623691][ T6486] BPF: [ 2920.623691][ T6486] [ 2920.629101][ T6492] BPF:Section overlap found [ 2920.639498][ T6495] BPF:hdr_len not found [ 2920.641410][ T6478] BPF: [ 2920.641410][ T6478] 09:58:40 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1d, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2920.689979][ T6497] BPF:[1] FUNC_PROTO (anon) [ 2920.709335][ T6498] BPF:[1] INT (anon) [ 2920.716988][ T6499] BPF:Unsupported section found [ 2920.726363][ T6497] BPF:return=0 args=( [ 2920.727845][ T6498] BPF:size=0 bits_offset=0 nr_bits=16 encoding=(none) 09:58:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000700)=""/220, 0x0, 0xdc, 0x8}, 0x20) 09:58:40 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2920.739661][ T6500] BPF:Unsupported section found [ 2920.756520][ T6498] BPF: [ 2920.759394][ T6498] BPF:nr_bits exceeds type_size [ 2920.782889][ T6497] BPF:167772160 (anon) 09:58:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x20000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2920.810156][ T6498] BPF: [ 2920.810156][ T6498] [ 2920.815435][ T6497] BPF:, 4 (invalid-name-offset) [ 2920.827914][ T6504] BPF:[1] INT (anon) [ 2920.858323][ T6497] BPF:) [ 2920.865860][ T6497] BPF: [ 2920.868928][ T6507] BPF:hdr_len not found [ 2920.891764][ T6504] BPF:size=0 bits_offset=0 nr_bits=16 encoding=(none) [ 2920.895787][ T6497] BPF:Invalid arg#1 [ 2920.905649][ T6509] BPF:[1] DATASEC (anon) [ 2920.906980][ T6510] BPF:Total section length too long [ 2920.925759][ T6504] BPF: [ 2920.925940][ T6509] BPF:size=0 vlen=6 [ 2920.930827][ T6504] BPF:nr_bits exceeds type_size [ 2920.936029][ T6497] BPF: [ 2920.936029][ T6497] [ 2920.945803][ T6504] BPF: [ 2920.945803][ T6504] [ 2920.953313][ T6515] BPF:Total section length too long 09:58:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000700)=""/220, 0x0, 0xdc, 0x8}, 0x20) 09:58:40 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x1c000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2920.956003][ T6514] BPF:Unsupported section found [ 2920.961047][ T6509] BPF: [ 2920.985917][ T6509] BPF:size == 0 [ 2920.985928][ T6509] BPF: [ 2920.985928][ T6509] 09:58:41 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x12}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2921.050376][ T6518] BPF:hdr_len not found [ 2921.068633][ T6519] BPF:Unsupported section found 09:58:41 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2e, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:41 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) 09:58:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000700)=""/220, 0x1a, 0xdc, 0x8}, 0x20) [ 2921.131561][ T6523] BPF:[1] FUNC_PROTO (anon) [ 2921.136339][ T6523] BPF:return=0 args=( 09:58:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3f000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2921.176643][ T6523] BPF:469762048 (anon) [ 2921.191707][ T6523] BPF:, 4 (invalid-name-offset) [ 2921.204339][ T6523] BPF:) [ 2921.214122][ T6523] BPF: [ 2921.223740][ T6523] BPF:Invalid arg#1 [ 2921.227893][ T6532] BPF:No type found [ 2921.233992][ T6526] BPF:[1] INT (anon) [ 2921.238017][ T6526] BPF:size=0 bits_offset=0 nr_bits=18 encoding=(none) [ 2921.242520][ T6523] BPF: [ 2921.242520][ T6523] [ 2921.259438][ T6533] BPF:[1] DATASEC (anon) [ 2921.264452][ T6528] BPF:Total section length too long [ 2921.274505][ T6533] BPF:size=0 vlen=6 [ 2921.281301][ T6536] BPF:Total section length too long [ 2921.300608][ T6533] BPF: [ 2921.301175][ T6538] BPF:[1] FUNC_PROTO (anon) [ 2921.308640][ T6538] BPF:return=0 args=( [ 2921.313686][ T6533] BPF:size == 0 [ 2921.319549][ T6526] BPF: 09:58:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000700)=""/220, 0x1a, 0xdc, 0x8}, 0x20) [ 2921.326420][ T6533] BPF: [ 2921.326420][ T6533] [ 2921.334825][ T6526] BPF:nr_bits exceeds type_size [ 2921.344510][ T6526] BPF: [ 2921.344510][ T6526] [ 2921.345103][ T6539] BPF:Unsupported section found [ 2921.349680][ T6538] BPF:469762048 (anon) [ 2921.360480][ T6540] BPF:[1] INT (anon) [ 2921.370369][ T6538] BPF:, 4 (invalid-name-offset) 09:58:41 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2921.375765][ T6540] BPF:size=0 bits_offset=0 nr_bits=18 encoding=(none) [ 2921.391480][ T6540] BPF: [ 2921.394389][ T6538] BPF:) [ 2921.397551][ T6540] BPF:nr_bits exceeds type_size [ 2921.407412][ T6538] BPF: 09:58:41 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2921.425663][ T6543] BPF:Unsupported section found [ 2921.430778][ T6544] BPF:No type found [ 2921.432355][ T6540] BPF: [ 2921.432355][ T6540] [ 2921.439546][ T6538] BPF:Invalid arg#1 [ 2921.457915][ T6538] BPF: [ 2921.457915][ T6538] 09:58:41 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000700)=""/220, 0x1a, 0xdc, 0x8}, 0x20) 09:58:41 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x1e000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x40000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2921.707802][ T6556] BPF:No type found [ 2921.709358][ T6555] BPF:[1] FUNC_PROTO (anon) [ 2921.728448][ T6558] BPF:[1] DATASEC (anon) [ 2921.737036][ T6560] BPF:Total section length too long [ 2921.743345][ T6555] BPF:return=0 args=( [ 2921.748396][ T6561] BPF:[1] INT (anon) [ 2921.753538][ T6563] BPF:Total section length too long [ 2921.758525][ T6558] BPF:size=0 vlen=6 [ 2921.758866][ T6555] BPF:503316480 (anon) [ 2921.767786][ T6561] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2921.768577][ T6562] BPF:Unsupported section found [ 2921.774925][ T6555] BPF:, 4 (invalid-name-offset) [ 2921.788005][ T6558] BPF: [ 2921.791047][ T6561] BPF: [ 2921.793715][ T6555] BPF:) [ 2921.793931][ T6561] BPF:nr_bits exceeds 128 [ 2921.798876][ T6555] BPF: 09:58:41 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x36, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, 0x0, 0x2a, 0x0, 0x8}, 0x20) [ 2921.808757][ T6555] BPF:Invalid arg#1 [ 2921.808773][ T6561] BPF: [ 2921.808773][ T6561] [ 2921.813127][ T6555] BPF: [ 2921.813127][ T6555] [ 2921.823978][ T6558] BPF:size == 0 [ 2921.836981][ T6565] BPF:[1] INT (anon) [ 2921.837646][ T6564] BPF:Unsupported section found [ 2921.851977][ T6566] BPF:[1] FUNC_PROTO (anon) [ 2921.857415][ T6565] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2921.867785][ T6566] BPF:return=0 args=( [ 2921.886826][ T6558] BPF: [ 2921.886826][ T6558] [ 2921.890558][ T6565] BPF: [ 2921.901269][ T6565] BPF:nr_bits exceeds 128 09:58:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2921.906912][ T6566] BPF:503316480 (anon) [ 2921.922489][ T6565] BPF: [ 2921.922489][ T6565] [ 2921.927940][ T6566] BPF:, 4 (invalid-name-offset) [ 2921.939374][ T6572] BPF:Total section length too long 09:58:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, 0x0, 0x2a, 0x0, 0x8}, 0x20) 09:58:41 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) 09:58:41 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2921.961647][ T6566] BPF:) [ 2921.973654][ T6566] BPF: [ 2921.983249][ T6566] BPF:Invalid arg#1 [ 2921.996094][ T6566] BPF: [ 2921.996094][ T6566] [ 2922.003173][ T6574] BPF:Total section length too long 09:58:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xb, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2922.081461][ T6581] BPF:Unsupported section found 09:58:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x20000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2922.123125][ T6585] BPF:Unsupported section found 09:58:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, 0x0, 0x2a, 0x0, 0x8}, 0x20) [ 2922.193044][ T6584] BPF:[1] DATASEC (anon) [ 2922.204787][ T6584] BPF:size=0 vlen=6 [ 2922.217156][ T6592] BPF:Section overlap found [ 2922.230214][ T6594] BPF:Section overlap found [ 2922.235384][ T6584] BPF: [ 2922.238306][ T6584] BPF:size == 0 09:58:42 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2922.246533][ T6593] BPF:[1] FUNC_PROTO (anon) [ 2922.270397][ T6584] BPF: [ 2922.270397][ T6584] [ 2922.277608][ T6593] BPF:return=0 args=( [ 2922.277621][ T6593] BPF:536870912 (anon) [ 2922.334459][ T6593] BPF:, 4 (invalid-name-offset) 09:58:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xf, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:42 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2922.356665][ T6600] BPF:Unsupported section found [ 2922.362263][ T6593] BPF:) [ 2922.378556][ T6593] BPF: [ 2922.401393][ T6593] BPF:Invalid arg#1 [ 2922.413996][ T6606] BPF:Unsupported section found [ 2922.419464][ T6593] BPF: [ 2922.419464][ T6593] 09:58:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc}, 0x20) 09:58:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x60000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2922.443538][ T6609] BPF:[1] FUNC_PROTO (anon) [ 2922.455387][ T6605] BPF:Unsupported section found [ 2922.481084][ T6609] BPF:return=0 args=( 09:58:42 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2922.507847][ T6612] BPF:Unsupported section found [ 2922.531350][ T6615] BPF:[1] DATASEC (anon) [ 2922.534789][ T6609] BPF:536870912 (anon) [ 2922.535725][ T6615] BPF:size=0 vlen=6 [ 2922.544396][ T6609] BPF:, 4 (invalid-name-offset) 09:58:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x1d, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2922.575409][ T6609] BPF:) [ 2922.583959][ T6609] BPF: [ 2922.588836][ T6618] BPF:Unsupported section found [ 2922.600640][ T6609] BPF:Invalid arg#1 [ 2922.615952][ T6609] BPF: [ 2922.615952][ T6609] 09:58:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc}, 0x20) [ 2922.626764][ T6623] BPF:Unsupported section found [ 2922.638370][ T6615] BPF: [ 2922.654203][ T6615] BPF:size == 0 [ 2922.669374][ T6615] BPF: [ 2922.669374][ T6615] 09:58:42 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x3f000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2922.739616][ T6628] BPF:Invalid section offset 09:58:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2922.784878][ T6632] BPF:Invalid section offset 09:58:42 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2922.825256][ T6636] BPF:[1] FUNC_PROTO (anon) [ 2922.841244][ T6636] BPF:return=0 args=( [ 2922.871095][ T6636] BPF:1056964608 (anon) 09:58:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc}, 0x20) [ 2922.892560][ T6636] BPF:, 4 (invalid-name-offset) 09:58:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x2e, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:42 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2922.916855][ T6636] BPF:) [ 2922.923525][ T6636] BPF: [ 2922.929718][ T6636] BPF:Invalid arg#1 [ 2922.987113][ T6644] BPF:Unsupported section found [ 2922.987116][ T6636] BPF: [ 2922.987116][ T6636] [ 2922.998948][ T6646] BPF:[1] FUNC_PROTO (anon) [ 2923.012006][ T6646] BPF:return=0 args=( [ 2923.036318][ T6648] BPF:[1] DATASEC (anon) [ 2923.036715][ T6651] BPF:Unsupported section found [ 2923.059491][ T6646] BPF:1056964608 (anon) [ 2923.062552][ T6648] BPF:size=0 vlen=6 [ 2923.074382][ T6646] BPF:, 4 (invalid-name-offset) [ 2923.081465][ T6648] BPF: 09:58:43 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2923.085622][ T6648] BPF:size == 0 [ 2923.089418][ T6653] BPF:Invalid section offset [ 2923.094948][ T6648] BPF: [ 2923.094948][ T6648] [ 2923.100776][ T6646] BPF:) 09:58:43 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) 09:58:43 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x12}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:43 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2923.133597][ T6646] BPF: [ 2923.136854][ T6658] BPF:Invalid section offset [ 2923.157681][ T6646] BPF:Invalid arg#1 [ 2923.167367][ T6646] BPF: [ 2923.167367][ T6646] [ 2923.178446][ T6660] BPF:[1] INT (anon) 09:58:43 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x34, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x40000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2923.240137][ T6660] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2923.289021][ T6671] BPF:Unsupported section found [ 2923.295995][ T6660] BPF: [ 2923.322813][ T6674] BPF:Unsupported section found [ 2923.328921][ T6670] BPF:[1] DATASEC (anon) 09:58:43 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2923.349182][ T6675] BPF:Invalid section offset [ 2923.351059][ T6660] BPF:nr_bits exceeds 128 [ 2923.372000][ T6660] BPF: [ 2923.372000][ T6660] [ 2923.377014][ T6670] BPF:size=0 vlen=6 [ 2923.387475][ T6678] BPF:Invalid section offset [ 2923.391083][ T6670] BPF: [ 2923.395999][ T6670] BPF:size == 0 09:58:43 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:43 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x36, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2923.411240][ T6677] BPF:[1] FUNC_PROTO (anon) [ 2923.415878][ T6677] BPF:return=0 args=( [ 2923.419868][ T6677] BPF:1073741824 (anon) [ 2923.451031][ T6670] BPF: [ 2923.451031][ T6670] [ 2923.492716][ T6684] BPF:Unsupported section found 09:58:43 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2923.528057][ T6688] BPF:Unsupported section found [ 2923.559148][ T6689] BPF:Invalid section offset 09:58:43 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2923.583506][ T6691] BPF:Invalid section offset [ 2923.607657][ T6677] BPF:, 4 (invalid-name-offset) 09:58:43 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2923.632552][ T6693] BPF:[1] INT (anon) 09:58:43 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:43 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2923.670344][ T6693] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2923.677574][ T6677] BPF:) [ 2923.680356][ T6677] BPF: [ 2923.692715][ T6677] BPF:Invalid arg#1 [ 2923.696906][ T6677] BPF: [ 2923.696906][ T6677] [ 2923.715803][ T6693] BPF: [ 2923.738763][ T6700] BPF:[1] FUNC_PROTO (anon) [ 2923.751391][ T6699] BPF:[1] DATASEC (anon) [ 2923.756284][ T6693] BPF:nr_bits exceeds 128 [ 2923.768827][ T6700] BPF:return=0 args=( [ 2923.774709][ T6693] BPF: [ 2923.774709][ T6693] [ 2923.779844][ T6699] BPF:size=0 vlen=6 09:58:43 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2923.795517][ T6700] BPF:1073741824 (anon) [ 2923.801602][ T6699] BPF: [ 2923.807365][ T6706] BPF:Unsupported section found [ 2923.817881][ T6699] BPF:size == 0 [ 2923.821829][ T6700] BPF:, 4 (invalid-name-offset) [ 2923.829652][ T6708] BPF:Unsupported section found [ 2923.831604][ T6699] BPF: [ 2923.831604][ T6699] [ 2923.834882][ T6707] BPF:Unsupported section found [ 2923.850312][ T6700] BPF:) [ 2923.857503][ T6700] BPF: [ 2923.884484][ T6700] BPF:Invalid arg#1 09:58:43 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2923.898650][ T6700] BPF: [ 2923.898650][ T6700] [ 2923.900384][ T6712] BPF:[1] INT (anon) [ 2923.911616][ T6712] BPF:size=0 bits_offset=2 nr_bits=0 encoding=(none) 09:58:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x48000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:43 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2923.951270][ T6712] BPF: [ 2923.968053][ T6712] BPF:nr_bits exceeds type_size 09:58:43 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xdb000000, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2923.995404][ T6712] BPF: [ 2923.995404][ T6712] [ 2924.037169][ T6716] BPF:[1] INT (anon) [ 2924.037472][ T6719] BPF:[1] INT (anon) [ 2924.048942][ T6716] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2924.075430][ T6718] BPF:[1] DATASEC (anon) [ 2924.079815][ T6718] BPF:size=0 vlen=6 [ 2924.091819][ T6719] BPF:size=0 bits_offset=2 nr_bits=0 encoding=(none) [ 2924.107299][ T6716] BPF: [ 2924.123166][ T6719] BPF: [ 2924.126133][ T6716] BPF:nr_bits exceeds 128 [ 2924.135713][ T6728] BPF:Invalid section offset [ 2924.140622][ T6716] BPF: [ 2924.140622][ T6716] [ 2924.148502][ T6729] BPF:Invalid section offset [ 2924.149764][ T6719] BPF:nr_bits exceeds type_size [ 2924.172965][ T6726] BPF:Total section length too long [ 2924.180242][ T6719] BPF: [ 2924.180242][ T6719] [ 2924.184681][ T6730] BPF:Total section length too long 09:58:44 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff00, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:44 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2924.191052][ T6718] BPF: [ 2924.193892][ T6718] BPF:size == 0 [ 2924.206712][ T6731] BPF:[1] FUNC_PROTO (anon) [ 2924.211662][ T6718] BPF: [ 2924.211662][ T6718] [ 2924.225057][ T6731] BPF:return=0 args=( 09:58:44 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2924.265355][ T6731] BPF:1207959552 (anon) [ 2924.294665][ T6735] BPF:[1] INT (anon) [ 2924.298898][ T6735] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2924.305961][ T6731] BPF:, 4 (invalid-name-offset) [ 2924.331475][ T6731] BPF:) [ 2924.338604][ T6731] BPF: [ 2924.357177][ T6731] BPF:Invalid arg#1 [ 2924.360594][ T6740] BPF:Invalid section offset [ 2924.373290][ T6742] BPF:Invalid section offset [ 2924.386982][ T6739] BPF:[1] INT (anon) 09:58:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2924.412060][ T6735] BPF: [ 2924.414957][ T6731] BPF: [ 2924.414957][ T6731] [ 2924.420006][ T6739] BPF:size=0 bits_offset=4 nr_bits=0 encoding=(none) [ 2924.426894][ T6735] BPF:nr_bits exceeds 128 [ 2924.434977][ T6746] BPF:Total section length too long [ 2924.442294][ T6747] BPF:[1] FUNC_PROTO (anon) [ 2924.447191][ T6747] BPF:return=0 args=( [ 2924.451468][ T6735] BPF: [ 2924.451468][ T6735] [ 2924.456450][ T6739] BPF: [ 2924.467584][ T6747] BPF:1207959552 (anon) [ 2924.473547][ T6739] BPF:nr_bits exceeds type_size [ 2924.486994][ T6747] BPF:, 4 (invalid-name-offset) [ 2924.492500][ T6739] BPF: [ 2924.492500][ T6739] [ 2924.497493][ T6748] BPF:[1] DATASEC (anon) [ 2924.503123][ T6749] BPF:Total section length too long [ 2924.503741][ T6747] BPF:) [ 2924.513274][ T6748] BPF:size=0 vlen=6 09:58:44 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2924.517099][ T6748] BPF: [ 2924.519868][ T6748] BPF:size == 0 [ 2924.529981][ T6753] BPF:[1] INT (anon) [ 2924.533179][ T6747] BPF: [ 2924.538279][ T6752] BPF:Unsupported section found [ 2924.545336][ T6747] BPF:Invalid arg#1 [ 2924.553663][ T6747] BPF: [ 2924.553663][ T6747] [ 2924.555889][ T6753] BPF:size=0 bits_offset=4 nr_bits=0 encoding=(none) [ 2924.564905][ T6748] BPF: 09:58:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x4c000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2924.564905][ T6748] [ 2924.565710][ T6754] BPF:Unsupported section found 09:58:44 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:44 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2924.611055][ T6753] BPF: [ 2924.621460][ T6753] BPF:nr_bits exceeds type_size [ 2924.651926][ T6753] BPF: [ 2924.651926][ T6753] [ 2924.676799][ T6757] BPF:[1] INT (anon) 09:58:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2924.706951][ T6757] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2924.742868][ T6765] BPF:[1] FUNC_PROTO (anon) [ 2924.759560][ T6763] BPF:Total section length too long [ 2924.770560][ T6757] BPF: [ 2924.778277][ T6757] BPF:nr_bits exceeds 128 [ 2924.783599][ T6766] BPF:[1] DATASEC (anon) [ 2924.788689][ T6757] BPF: [ 2924.788689][ T6757] [ 2924.793977][ T6765] BPF:return=0 args=( [ 2924.799077][ T6770] BPF:Total section length too long 09:58:44 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2924.808799][ T6765] BPF:1275068416 (anon) [ 2924.814591][ T6766] BPF:size=0 vlen=6 [ 2924.825214][ T6765] BPF:, 4 (invalid-name-offset) [ 2924.832065][ T6766] BPF: [ 2924.839604][ T6765] BPF:) [ 2924.843489][ T6769] BPF:Unsupported section found [ 2924.852144][ T6766] BPF:size == 0 [ 2924.855659][ T6766] BPF: 09:58:44 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:44 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2924.855659][ T6766] [ 2924.858382][ T6765] BPF: [ 2924.875048][ T6772] BPF:Unsupported section found [ 2924.885748][ T6765] BPF:Invalid arg#1 [ 2924.911109][ T6765] BPF: [ 2924.911109][ T6765] 09:58:44 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2924.943863][ T6775] BPF:[1] FUNC_PROTO (anon) [ 2924.976409][ T6777] BPF:[1] INT (anon) [ 2925.000244][ T6775] BPF:return=0 args=( [ 2925.008987][ T6777] BPF:size=0 bits_offset=8 nr_bits=0 encoding=(none) [ 2925.019963][ T6781] BPF:Total section length too long 09:58:45 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2925.043294][ T6782] BPF:[1] INT (anon) [ 2925.053291][ T6785] BPF:Total section length too long [ 2925.053375][ T6777] BPF: [ 2925.060837][ T6782] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2925.071139][ T6775] BPF:1275068416 (anon) 09:58:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2925.089614][ T6784] BPF:[1] DATASEC (anon) [ 2925.091292][ T6777] BPF:nr_bits exceeds type_size [ 2925.098733][ T6782] BPF: [ 2925.099052][ T6775] BPF:, 4 (invalid-name-offset) [ 2925.110978][ T6782] BPF:nr_bits exceeds 128 [ 2925.116838][ T6777] BPF: [ 2925.116838][ T6777] [ 2925.123788][ T6784] BPF:size=0 vlen=6 [ 2925.130072][ T6789] BPF:[1] INT (anon) [ 2925.131237][ T6775] BPF:) [ 2925.145614][ T6782] BPF: [ 2925.145614][ T6782] [ 2925.148707][ T6775] BPF: [ 2925.151733][ T6784] BPF: [ 2925.153481][ T6788] BPF:Section overlap found [ 2925.166122][ T6784] BPF:size == 0 [ 2925.169730][ T6789] BPF:size=0 bits_offset=8 nr_bits=0 encoding=(none) [ 2925.174457][ T6775] BPF:Invalid arg#1 [ 2925.182639][ T6775] BPF: [ 2925.182639][ T6775] [ 2925.188324][ T6791] BPF:Section overlap found [ 2925.196624][ T6784] BPF: [ 2925.196624][ T6784] 09:58:45 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:45 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2925.242116][ T6789] BPF: [ 2925.245018][ T6789] BPF:nr_bits exceeds type_size [ 2925.267057][ T6793] BPF:Total section length too long [ 2925.283008][ T6789] BPF: [ 2925.283008][ T6789] 09:58:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x60000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:45 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1d, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2925.299787][ T6796] BPF:Total section length too long 09:58:45 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2925.367754][ T6801] BPF:[1] INT (anon) [ 2925.387557][ T6802] BPF:[1] DATASEC (anon) 09:58:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x1d, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2925.414443][ T6801] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2925.432000][ T6802] BPF:size=0 vlen=6 [ 2925.434219][ T6807] BPF:[1] FUNC_PROTO (anon) [ 2925.436225][ T6802] BPF: [ 2925.444975][ T6805] BPF:Total section length too long [ 2925.448369][ T6801] BPF: [ 2925.461756][ T6801] BPF:nr_bits exceeds 128 [ 2925.467941][ T6807] BPF:return=0 args=( [ 2925.477253][ T6801] BPF: [ 2925.477253][ T6801] [ 2925.483850][ T6802] BPF:size == 0 [ 2925.490870][ T6802] BPF: [ 2925.490870][ T6802] [ 2925.497741][ T6807] BPF:1610612736 (anon) [ 2925.508473][ T6811] BPF:Total section length too long 09:58:45 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2925.515821][ T6809] BPF:[1] INT (anon) [ 2925.524395][ T6807] BPF:, 4 (invalid-name-offset) [ 2925.536072][ T6809] BPF:size=0 bits_offset=16 nr_bits=0 encoding=(none) [ 2925.545882][ T6807] BPF:) [ 2925.559803][ T6807] BPF: 09:58:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x0, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2925.565837][ T6807] BPF:Invalid arg#1 [ 2925.571072][ T6809] BPF: [ 2925.575608][ T6813] BPF:Total section length too long [ 2925.581891][ T6809] BPF:nr_bits exceeds type_size 09:58:45 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2b, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2925.615301][ T6807] BPF: [ 2925.615301][ T6807] [ 2925.626628][ T6809] BPF: [ 2925.626628][ T6809] [ 2925.636993][ T6817] BPF:[1] FUNC_PROTO (anon) [ 2925.638115][ T6818] BPF:Total section length too long [ 2925.664131][ T6820] BPF:[1] INT (anon) [ 2925.674713][ T6821] BPF:[1] DATASEC (anon) [ 2925.679685][ T6822] BPF:[1] INT (anon) [ 2925.680325][ T6817] BPF:return=0 args=( [ 2925.690565][ T6820] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) 09:58:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2e, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2925.713759][ T6822] BPF:size=0 bits_offset=16 nr_bits=0 encoding=(none) [ 2925.714316][ T6817] BPF:1610612736 (anon) [ 2925.725927][ T6821] BPF:size=0 vlen=6 [ 2925.735402][ T6820] BPF: [ 2925.738436][ T6820] BPF:nr_bits exceeds 128 [ 2925.742019][ T6825] BPF:Total section length too long [ 2925.748091][ T6821] BPF: [ 2925.750529][ T6826] BPF:Total section length too long [ 2925.761165][ T6820] BPF: [ 2925.761165][ T6820] [ 2925.763173][ T6821] BPF:size == 0 [ 2925.766163][ T6817] BPF:, 4 (invalid-name-offset) [ 2925.780378][ T6821] BPF: [ 2925.780378][ T6821] [ 2925.788491][ T6822] BPF: [ 2925.792473][ T6822] BPF:nr_bits exceeds type_size [ 2925.797429][ T6822] BPF: [ 2925.797429][ T6822] 09:58:45 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2f, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:45 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x12}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:45 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x0, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2925.817833][ T6817] BPF:) [ 2925.820643][ T6817] BPF: [ 2925.841055][ T6817] BPF:Invalid arg#1 [ 2925.844985][ T6817] BPF: [ 2925.844985][ T6817] [ 2925.855679][ T6829] BPF:Total section length too long [ 2925.912995][ T6830] BPF:Total section length too long 09:58:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x68000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2925.983227][ T6838] BPF:Total section length too long [ 2925.989326][ T6839] BPF:[1] INT (anon) [ 2926.008232][ T6839] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2926.021810][ T6841] BPF:[1] DATASEC (anon) [ 2926.026186][ T6841] BPF:size=0 vlen=6 09:58:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x34, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2926.031445][ T6843] BPF:Total section length too long [ 2926.036887][ T6839] BPF: [ 2926.040141][ T6839] BPF:nr_bits exceeds 128 [ 2926.046568][ T6839] BPF: [ 2926.046568][ T6839] [ 2926.055019][ T6841] BPF: [ 2926.057888][ T6841] BPF:size == 0 [ 2926.061850][ T6844] BPF:[1] INT (anon) [ 2926.070632][ T6841] BPF: [ 2926.070632][ T6841] [ 2926.080205][ T6844] BPF:size=0 bits_offset=18 nr_bits=0 encoding=(none) 09:58:46 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2926.104177][ T6844] BPF: [ 2926.107460][ T6846] BPF:[1] FUNC_PROTO (anon) [ 2926.140000][ T6844] BPF:nr_bits exceeds type_size 09:58:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x0, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2926.175022][ T6848] BPF:Total section length too long [ 2926.192691][ T6846] BPF:return=0 args=( [ 2926.202455][ T6844] BPF: [ 2926.202455][ T6844] [ 2926.209819][ T6853] BPF:Total section length too long [ 2926.230037][ T6846] BPF:1744830464 (anon) [ 2926.242928][ T6856] BPF:[1] INT (anon) [ 2926.256896][ T6846] BPF:, 4 (invalid-name-offset) [ 2926.258921][ T6855] BPF:[1] INT (anon) [ 2926.267246][ T6856] BPF:size=0 bits_offset=18 nr_bits=0 encoding=(none) [ 2926.274201][ T6855] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2926.274209][ T6855] BPF: [ 2926.274217][ T6855] BPF:nr_bits exceeds 128 [ 2926.274224][ T6855] BPF: [ 2926.274224][ T6855] [ 2926.301100][ T6846] BPF:) 09:58:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x36, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:46 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2926.329864][ T6859] BPF:[1] DATASEC (anon) [ 2926.339048][ T6859] BPF:size=0 vlen=6 [ 2926.348195][ T6859] BPF: [ 2926.352171][ T6859] BPF:size == 0 [ 2926.361634][ T6856] BPF: [ 2926.364458][ T6856] BPF:nr_bits exceeds type_size [ 2926.367717][ T6859] BPF: [ 2926.367717][ T6859] [ 2926.369299][ T6856] BPF: [ 2926.369299][ T6856] [ 2926.370010][ T6846] BPF: [ 2926.402475][ T6860] BPF:Total section length too long [ 2926.418949][ T6846] BPF:Invalid arg#1 [ 2926.424769][ T6846] BPF: [ 2926.424769][ T6846] [ 2926.431514][ T6867] BPF:Total section length too long [ 2926.444096][ T6865] BPF:Total section length too long 09:58:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2926.448109][ T6864] BPF:[1] INT (anon) [ 2926.449477][ T6868] BPF:[1] FUNC_PROTO (anon) [ 2926.458214][ T6864] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2926.478051][ T6868] BPF:return=0 args=( [ 2926.479999][ T6869] BPF:Total section length too long [ 2926.486951][ T6868] BPF:1744830464 (anon) 09:58:46 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x35, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2926.519152][ T6868] BPF:, 4 (invalid-name-offset) 09:58:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x63, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2926.562972][ T6864] BPF: [ 2926.570851][ T6868] BPF:) [ 2926.576146][ T6873] BPF:[1] DATASEC (anon) [ 2926.581765][ T6864] BPF:nr_bits exceeds 128 [ 2926.596232][ T6873] BPF:size=0 vlen=6 [ 2926.598401][ T6868] BPF: [ 2926.603182][ T6864] BPF: [ 2926.603182][ T6864] [ 2926.610168][ T6873] BPF: [ 2926.622908][ T6873] BPF:size == 0 [ 2926.633701][ T6868] BPF:Invalid arg#1 [ 2926.642684][ T6877] BPF:Total section length too long [ 2926.644514][ T6873] BPF: [ 2926.644514][ T6873] [ 2926.653175][ T6868] BPF: [ 2926.653175][ T6868] 09:58:46 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2926.684620][ T6879] BPF:Total section length too long 09:58:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x6c000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2926.711899][ T6878] BPF:[1] INT (anon) [ 2926.715960][ T6878] BPF:size=0 bits_offset=219 nr_bits=0 encoding=(none) [ 2926.781151][ T6878] BPF: [ 2926.784165][ T6878] BPF:nr_bits exceeds 128 [ 2926.788100][ T6886] BPF:[1] DATASEC (anon) [ 2926.788977][ T6878] BPF: [ 2926.788977][ T6878] [ 2926.799792][ T6884] BPF:Total section length too long 09:58:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4a, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2926.833119][ T6891] BPF:[1] INT (anon) [ 2926.843091][ T6891] BPF:size=0 bits_offset=219 nr_bits=0 encoding=(none) [ 2926.858313][ T6892] BPF:Total section length too long [ 2926.858418][ T6886] BPF:size=0 vlen=6 [ 2926.864866][ T6889] BPF:[1] INT (anon) [ 2926.869772][ T6886] BPF: [ 2926.891983][ T6886] BPF:size == 0 [ 2926.897225][ T6891] BPF: [ 2926.903837][ T6889] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2926.907137][ T6886] BPF: [ 2926.907137][ T6886] [ 2926.916017][ T6894] BPF:[1] FUNC_PROTO (anon) [ 2926.927231][ T6894] BPF:return=0 args=( [ 2926.931729][ T6889] BPF: [ 2926.936591][ T6891] BPF:nr_bits exceeds 128 09:58:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x0, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2926.942510][ T6889] BPF:nr_bits exceeds 128 [ 2926.947918][ T6891] BPF: [ 2926.947918][ T6891] [ 2926.953023][ T6894] BPF:1811939328 (anon) [ 2926.953642][ T6889] BPF: [ 2926.953642][ T6889] [ 2926.961826][ T6894] BPF:, 4 (invalid-name-offset) [ 2926.969167][ T6896] BPF:Total section length too long 09:58:46 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2926.999590][ T6898] BPF:Total section length too long [ 2927.001509][ T6894] BPF:) [ 2927.026493][ T6894] BPF: [ 2927.029358][ T6894] BPF:Invalid arg#1 [ 2927.041083][ T6900] BPF:[1] DATASEC (anon) 09:58:47 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x0, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2927.068205][ T6900] BPF: [ 2927.070024][ T6894] BPF: [ 2927.070024][ T6894] 09:58:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x8, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2927.108973][ T6900] BPF:meta_left:0 meta_needed:24 [ 2927.114503][ T6905] BPF:[1] FUNC_PROTO (anon) [ 2927.140992][ T6900] BPF: [ 2927.140992][ T6900] [ 2927.146078][ T6905] BPF:return=0 args=( [ 2927.153115][ T6908] BPF:[1] DATASEC (anon) [ 2927.185825][ T6912] BPF:[1] DATASEC (anon) [ 2927.186013][ T6905] BPF:1811939328 (anon) [ 2927.194946][ T6908] BPF:size=0 vlen=6 [ 2927.204374][ T6913] BPF:[1] INT (anon) [ 2927.208632][ T6912] BPF: [ 2927.211841][ T6905] BPF:, 4 (invalid-name-offset) [ 2927.219308][ T6912] BPF:meta_left:0 meta_needed:24 [ 2927.220499][ T6908] BPF: 09:58:47 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2927.231121][ T6913] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2927.232170][ T6905] BPF:) [ 2927.243021][ T6912] BPF: [ 2927.243021][ T6912] [ 2927.243673][ T6908] BPF:size == 0 [ 2927.249173][ T6905] BPF: [ 2927.257670][ T6905] BPF:Invalid arg#1 [ 2927.266783][ T6915] BPF:Section overlap found [ 2927.266809][ T6908] BPF: [ 2927.266809][ T6908] [ 2927.276339][ T6916] BPF:Section overlap found [ 2927.281258][ T6913] BPF: 09:58:47 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x2, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2927.284214][ T6913] BPF:nr_bits exceeds 128 [ 2927.288721][ T6913] BPF: [ 2927.288721][ T6913] [ 2927.297085][ T6905] BPF: [ 2927.297085][ T6905] 09:58:47 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x0, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0xb, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:47 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x74000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:47 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2927.450357][ T6923] BPF:[1] DATASEC 09:58:47 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2927.471330][ T6929] BPF:[1] INT (anon) [ 2927.479145][ T6923] BPF: [ 2927.495322][ T6932] BPF:Section overlap found [ 2927.495472][ T6923] BPF:meta_left:0 meta_needed:24 [ 2927.536770][ T6929] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2927.543109][ T6934] BPF:[1] DATASEC (anon) [ 2927.555480][ T6938] BPF:Section overlap found [ 2927.567103][ T6923] BPF: [ 2927.567103][ T6923] [ 2927.575656][ T6934] BPF:size=0 vlen=6 [ 2927.581327][ T6929] BPF: 09:58:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x12, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2927.584269][ T6929] BPF:nr_bits exceeds 128 [ 2927.593102][ T6939] BPF:[1] DATASEC [ 2927.604473][ T6929] BPF: [ 2927.604473][ T6929] [ 2927.608673][ T6934] BPF: [ 2927.614525][ T6935] BPF:[1] FUNC_PROTO (anon) [ 2927.623443][ T6939] BPF: [ 2927.633450][ T6934] BPF:size == 0 [ 2927.638213][ T6939] BPF:meta_left:0 meta_needed:24 [ 2927.646170][ T6935] BPF:return=0 args=( [ 2927.650092][ T6934] BPF: [ 2927.650092][ T6934] [ 2927.667355][ T6939] BPF: [ 2927.667355][ T6939] [ 2927.670817][ T6935] BPF:1946157056 (anon) 09:58:47 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x0, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:47 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2927.684863][ T6935] BPF:, 4 (invalid-name-offset) [ 2927.701286][ T6935] BPF:) [ 2927.714552][ T6935] BPF: [ 2927.725341][ T6935] BPF:Invalid arg#1 [ 2927.729363][ T6944] BPF:Unsupported section found [ 2927.747112][ T6935] BPF: [ 2927.747112][ T6935] [ 2927.752491][ T6947] BPF:[1] INT (anon) [ 2927.759097][ T6948] BPF:Unsupported section found [ 2927.782608][ T6947] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) 09:58:47 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) 09:58:47 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2927.797216][ T6951] BPF:[1] FUNC_PROTO (anon) 09:58:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x1d, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2927.825764][ T6947] BPF: [ 2927.828713][ T6947] BPF:nr_bits exceeds 128 [ 2927.840560][ T6952] BPF:[1] INT (anon) [ 2927.844023][ T6947] BPF: [ 2927.844023][ T6947] [ 2927.859267][ T6951] BPF:return=0 args=( [ 2927.882519][ T6952] BPF:size=0 bits_offset=0 nr_bits=0 encoding=UNKN [ 2927.889075][ T6952] BPF: [ 2927.899188][ T6951] BPF:1946157056 (anon) [ 2927.906387][ T6956] BPF:[1] Invalid name_offset:3 [ 2927.911843][ T6951] BPF:, 4 (invalid-name-offset) 09:58:47 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2927.935382][ T6958] BPF:[1] DATASEC (anon) [ 2927.939848][ T6958] BPF:size=0 vlen=6 [ 2927.949520][ T6951] BPF:) [ 2927.954554][ T6951] BPF: [ 2927.958879][ T6961] BPF:[1] Invalid name_offset:3 [ 2927.964436][ T6951] BPF:Invalid arg#1 [ 2927.971755][ T6951] BPF: [ 2927.971755][ T6951] [ 2927.980068][ T6952] BPF:Unsupported encoding [ 2927.986896][ T6958] BPF: 09:58:47 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x4, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2928.009403][ T6962] BPF:Invalid section offset [ 2928.015397][ T6958] BPF:size == 0 [ 2928.021363][ T6952] BPF: [ 2928.021363][ T6952] [ 2928.042271][ T6958] BPF: [ 2928.042271][ T6958] [ 2928.046477][ T6965] BPF:Invalid section offset [ 2928.048083][ T6966] BPF:[1] INT (anon) 09:58:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x7a000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2928.058533][ T6967] BPF:[1] INT (anon) [ 2928.089047][ T6966] BPF:size=0 bits_offset=0 nr_bits=0 encoding=UNKN [ 2928.098961][ T6967] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2928.112952][ T6970] BPF:[1] Invalid name_offset:4 [ 2928.125323][ T6966] BPF: 09:58:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x2b, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2928.139915][ T6966] BPF:Unsupported encoding [ 2928.153844][ T6966] BPF: [ 2928.153844][ T6966] [ 2928.168248][ T6967] BPF: [ 2928.177746][ T6974] BPF:[1] Invalid name_offset:4 [ 2928.183683][ T6973] BPF:[1] FUNC_PROTO (anon) 09:58:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2928.190649][ T6967] BPF:nr_bits exceeds 128 09:58:48 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2928.221034][ T6973] BPF:return=0 args=( [ 2928.241172][ T6973] BPF:2046820352 (anon) [ 2928.245381][ T6973] BPF:, 4 (invalid-name-offset) [ 2928.250234][ T6973] BPF:) [ 2928.253602][ T6967] BPF: [ 2928.253602][ T6967] 09:58:48 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2928.285489][ T6977] BPF:Invalid section offset [ 2928.301236][ T6973] BPF: [ 2928.311710][ T6973] BPF:Invalid arg#1 [ 2928.318801][ T6973] BPF: [ 2928.318801][ T6973] [ 2928.325810][ T6980] BPF:[1] DATASEC (anon) [ 2928.325820][ T6980] BPF:size=0 vlen=6 09:58:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x5, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2928.325825][ T6980] BPF: [ 2928.325831][ T6980] BPF:size == 0 [ 2928.325836][ T6980] BPF: [ 2928.325836][ T6980] [ 2928.381444][ T6985] BPF:Invalid section offset 09:58:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2928.404410][ T6984] BPF:[1] INT (anon) [ 2928.434767][ T6984] BPF: [ 2928.446439][ T6989] BPF:[1] Invalid name_offset:5 [ 2928.459663][ T6990] BPF:[1] FUNC_PROTO (anon) [ 2928.464732][ T6984] BPF:Invalid int_data:10000000 [ 2928.469931][ T6984] BPF: [ 2928.469931][ T6984] 09:58:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x2f, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2928.482708][ T6991] BPF:[1] INT (anon) [ 2928.486738][ T6991] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2928.498165][ T6995] BPF:[1] Invalid name_offset:5 [ 2928.503405][ T6996] BPF:[1] INT (anon) [ 2928.507316][ T6996] BPF: [ 2928.510077][ T6996] BPF:Invalid int_data:10000000 [ 2928.515510][ T6990] BPF:return=0 args=( [ 2928.523095][ T6994] BPF:[1] DATASEC (anon) [ 2928.524937][ T6990] BPF:2046820352 (anon) [ 2928.527619][ T6994] BPF:size=0 vlen=6 [ 2928.539689][ T6991] BPF: [ 2928.549280][ T6990] BPF:, 4 (invalid-name-offset) [ 2928.558870][ T6991] BPF:nr_bits exceeds 128 [ 2928.563578][ T6994] BPF: [ 2928.565865][ T6990] BPF:) [ 2928.566423][ T6994] BPF:size == 0 [ 2928.569520][ T6999] BPF:Invalid section offset [ 2928.578031][ T6990] BPF: [ 2928.580474][ T6994] BPF: [ 2928.580474][ T6994] 09:58:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x6, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2928.581291][ T6991] BPF: [ 2928.581291][ T6991] [ 2928.602395][ T6996] BPF: [ 2928.602395][ T6996] [ 2928.603293][ T6990] BPF:Invalid arg#1 [ 2928.607459][ T7000] BPF:Invalid section offset [ 2928.612948][ T6990] BPF: [ 2928.612948][ T6990] 09:58:48 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0xda000000}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x34, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2928.738579][ T7006] BPF:[1] DATASEC (anon) 09:58:48 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x12}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2928.766352][ T7006] BPF:size=0 vlen=6 [ 2928.783599][ T7007] BPF:[1] Invalid name_offset:6 [ 2928.799107][ T7011] BPF:[1] INT (anon) [ 2928.803428][ T7006] BPF: [ 2928.806312][ T7006] BPF:size == 0 [ 2928.811442][ T7006] BPF: [ 2928.811442][ T7006] [ 2928.817736][ T7011] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2928.824966][ T7011] BPF: [ 2928.831378][ T7012] BPF:[1] Invalid name_offset:6 [ 2928.837531][ T7011] BPF:nr_bits exceeds 128 [ 2928.846579][ T7011] BPF: [ 2928.846579][ T7011] 09:58:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2928.875871][ T7015] BPF:[1] FUNC_PROTO (anon) 09:58:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x7, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:48 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2928.921378][ T7015] BPF:return=0 args=( [ 2928.951055][ T7018] BPF:Invalid section offset [ 2928.951300][ T7015] BPF:3657433088 (anon) [ 2928.966096][ T7021] BPF:[1] INT (anon) [ 2928.983164][ T7023] BPF:[1] DATASEC (anon) [ 2928.993027][ T7025] BPF:Invalid section offset [ 2929.004472][ T7023] BPF:size=0 vlen=6 [ 2929.015477][ T7015] BPF:, 4 (invalid-name-offset) [ 2929.020534][ T7021] BPF: [ 2929.029667][ T7021] BPF:Invalid int_data:12000000 [ 2929.030025][ T7023] BPF: [ 2929.043165][ T7015] BPF:) [ 2929.049484][ T7015] BPF: [ 2929.054216][ T7021] BPF: [ 2929.054216][ T7021] [ 2929.062491][ T7023] BPF:size == 0 [ 2929.062790][ T7015] BPF:Invalid arg#1 [ 2929.069717][ T7028] BPF:[1] Invalid name_offset:7 [ 2929.072522][ T7015] BPF: [ 2929.072522][ T7015] [ 2929.075131][ T7023] BPF: [ 2929.075131][ T7023] [ 2929.085015][ T7030] BPF:[1] INT (anon) [ 2929.090834][ T7031] BPF:[1] FUNC_PROTO (anon) [ 2929.095698][ T7029] BPF:[1] INT (anon) 09:58:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x35, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2929.099766][ T7029] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2929.103248][ T7032] BPF:[1] Invalid name_offset:7 [ 2929.106804][ T7030] BPF: [ 2929.114402][ T7031] BPF:return=0 args=( [ 2929.118572][ T7029] BPF: [ 2929.140267][ T7029] BPF:nr_bits exceeds 128 [ 2929.144808][ T7031] BPF:3657433088 (anon) 09:58:49 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2929.151251][ T7030] BPF:Invalid int_data:12000000 [ 2929.156310][ T7029] BPF: [ 2929.156310][ T7029] [ 2929.164216][ T7031] BPF:, 4 (invalid-name-offset) [ 2929.167824][ T7030] BPF: [ 2929.167824][ T7030] [ 2929.173333][ T7031] BPF:) [ 2929.190652][ T7031] BPF: 09:58:49 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x8, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:49 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2929.211000][ T7035] BPF:Invalid section offset [ 2929.221055][ T7031] BPF:Invalid arg#1 [ 2929.226676][ T7036] BPF:Invalid section offset [ 2929.236867][ T7031] BPF: [ 2929.236867][ T7031] 09:58:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2929.287365][ T7041] BPF:[1] Invalid name_offset:8 [ 2929.295248][ T7042] BPF:[1] DATASEC (anon) [ 2929.299618][ T7042] BPF:size=0 vlen=6 09:58:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x4a, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2929.338160][ T7046] BPF:[1] Invalid name_offset:8 [ 2929.350137][ T7042] BPF: [ 2929.375719][ T7042] BPF:size == 0 [ 2929.384515][ T7047] BPF:[1] INT (anon) 09:58:49 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0xffff0f00}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:49 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0xa, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2929.416474][ T7042] BPF: [ 2929.416474][ T7042] [ 2929.421969][ T7047] BPF: [ 2929.434838][ T7050] BPF:[1] INT (anon) [ 2929.442381][ T7047] BPF:Invalid int_data:db000000 [ 2929.450365][ T7050] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2929.461258][ T7047] BPF: [ 2929.461258][ T7047] [ 2929.489171][ T7053] BPF:Invalid section offset 09:58:49 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2929.510431][ T7056] BPF:Invalid section offset [ 2929.531208][ T7050] BPF: [ 2929.534249][ T7050] BPF:nr_bits exceeds 128 [ 2929.541512][ T7059] BPF:[1] INT (anon) [ 2929.545469][ T7059] BPF: [ 2929.548250][ T7059] BPF:Invalid int_data:db000000 [ 2929.554409][ T7050] BPF: [ 2929.554409][ T7050] [ 2929.571394][ T7055] BPF:[1] Invalid name_offset:10 09:58:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x1d, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2929.589088][ T7061] BPF:[1] FUNC_PROTO (anon) [ 2929.591974][ T7059] BPF: [ 2929.591974][ T7059] [ 2929.600340][ T7063] BPF:[1] Invalid name_offset:10 [ 2929.604189][ T7061] BPF:return=0 args=( [ 2929.623649][ T7061] BPF:4294905600 (anon) [ 2929.627847][ T7061] BPF:, 4 (invalid-name-offset) [ 2929.642928][ T7064] BPF:[1] DATASEC (anon) [ 2929.655397][ T7064] BPF:size=0 vlen=6 [ 2929.658321][ T7061] BPF:) [ 2929.668184][ T7064] BPF: [ 2929.675831][ T7061] BPF: [ 2929.677167][ T7067] BPF:Total section length too long [ 2929.684182][ T7061] BPF:Invalid arg#1 09:58:49 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:49 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0xc, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2929.690976][ T7064] BPF:size == 0 [ 2929.694568][ T7064] BPF: [ 2929.694568][ T7064] [ 2929.695552][ T7061] BPF: [ 2929.695552][ T7061] [ 2929.708657][ T7068] BPF:Total section length too long [ 2929.726468][ T7069] BPF:[1] FUNC_PROTO (anon) [ 2929.732580][ T7069] BPF:return=0 args=( [ 2929.736759][ T7069] BPF:4294905600 (anon) 09:58:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:49 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2929.741115][ T7069] BPF:, 4 (invalid-name-offset) [ 2929.746130][ T7069] BPF:) [ 2929.750161][ T7069] BPF: [ 2929.753195][ T7069] BPF:Invalid arg#1 [ 2929.812001][ T7069] BPF: [ 2929.812001][ T7069] [ 2929.842347][ T7078] BPF:[1] INT (anon) [ 2929.854153][ T7076] BPF:[1] Invalid name_offset:12 [ 2929.875402][ T7078] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2929.886828][ T7082] BPF:[1] Invalid name_offset:12 09:58:49 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}, {0x2}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2b, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2929.899832][ T7078] BPF: [ 2929.909451][ T7078] BPF:nr_bits exceeds 128 [ 2929.921157][ T7078] BPF: [ 2929.921157][ T7078] [ 2929.927872][ T7083] BPF:[1] DATASEC (anon) 09:58:49 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0xffffff00}, {0xb, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:49 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0xf, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2929.956529][ T7083] BPF:size=0 vlen=6 [ 2929.960387][ T7083] BPF: [ 2929.992569][ T7083] BPF:size == 0 09:58:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2930.029290][ T7083] BPF: [ 2930.029290][ T7083] [ 2930.038731][ T7089] BPF:Invalid string section [ 2930.049034][ T7088] BPF:Total section length too long [ 2930.068499][ T7093] BPF:Total section length too long [ 2930.108992][ T7094] BPF:Invalid string section [ 2930.128962][ T7097] BPF:[1] FUNC_PROTO (anon) [ 2930.147766][ T7097] BPF:return=0 args=( 09:58:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) 09:58:50 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}, {0x4}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x34, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2930.158735][ T7097] BPF:4294967040 (anon) [ 2930.168383][ T7099] BPF:[1] INT (anon) [ 2930.177652][ T7097] BPF:, 4 (invalid-name-offset) [ 2930.185796][ T7097] BPF:) [ 2930.193178][ T7097] BPF: [ 2930.197273][ T7097] BPF:Invalid arg#1 [ 2930.224429][ T7097] BPF: [ 2930.224429][ T7097] [ 2930.247058][ T7099] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2930.254430][ T7105] BPF:[1] FUNC_PROTO (anon) [ 2930.259051][ T7105] BPF:return=0 args=( [ 2930.267038][ T7104] BPF:[1] DATASEC (anon) [ 2930.272480][ T7103] BPF:[1] Invalid name_offset:15 [ 2930.289090][ T7099] BPF: [ 2930.290589][ T7109] BPF:[1] Invalid name_offset:15 [ 2930.299412][ T7104] BPF:size=0 vlen=6 [ 2930.301167][ T7099] BPF:nr_bits exceeds 128 [ 2930.308025][ T7104] BPF: [ 2930.308336][ T7099] BPF: [ 2930.308336][ T7099] [ 2930.324482][ T7104] BPF:size == 0 [ 2930.326708][ T7110] BPF:Invalid string section [ 2930.338180][ T7104] BPF: [ 2930.338180][ T7104] [ 2930.340767][ T7105] BPF:4294967040 (anon) 09:58:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x18, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:50 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2930.357658][ T7112] BPF:Invalid string section [ 2930.363963][ T7111] BPF:Total section length too long [ 2930.369281][ T7105] BPF:, 4 (invalid-name-offset) [ 2930.380984][ T7105] BPF:) [ 2930.388133][ T7113] BPF:Total section length too long [ 2930.391685][ T7105] BPF: 09:58:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2930.428437][ T7105] BPF:Invalid arg#1 [ 2930.451943][ T7105] BPF: [ 2930.451943][ T7105] 09:58:50 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}, {0x8}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2930.493841][ T7117] BPF:[1] INT (anon) [ 2930.499676][ T7119] BPF:[1] Invalid name_offset:24 [ 2930.511160][ T7117] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2930.527642][ T7117] BPF: [ 2930.534859][ T7123] BPF:[1] Invalid name_offset:24 09:58:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x35, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:50 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x2, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2930.544176][ T7117] BPF:nr_bits exceeds 128 [ 2930.555694][ T7117] BPF: [ 2930.555694][ T7117] [ 2930.578290][ T7122] BPF:[1] DATASEC (anon) [ 2930.615426][ T7122] BPF:size=0 vlen=6 [ 2930.646814][ T7122] BPF: [ 2930.657556][ T7122] BPF:size == 0 09:58:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x48, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2930.664157][ T7129] BPF:Invalid string section [ 2930.677532][ T7132] BPF:[1] FUNC_PROTO (anon) [ 2930.677687][ T7130] BPF:Total section length too long [ 2930.695401][ T7132] BPF:return=0 args=( [ 2930.701343][ T7122] BPF: [ 2930.701343][ T7122] 09:58:50 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2930.711858][ T7134] BPF:Total section length too long [ 2930.723540][ T7132] BPF:0 (anon) [ 2930.735079][ T7132] BPF:, 4 (invalid-name-offset) [ 2930.742384][ T7135] BPF:Invalid string section [ 2930.748698][ T7132] BPF:) 09:58:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@union={0x0, 0x6, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}, {0xd, 0x3, 0x81}]}]}}, &(0x7f00000000c0)=""/225, 0x6e, 0xe1, 0x8}, 0x20) [ 2930.767038][ T7132] BPF: [ 2930.770258][ T7137] BPF:[1] Invalid name_offset:72 [ 2930.784014][ T7132] BPF:Invalid arg#1 [ 2930.787862][ T7132] BPF: [ 2930.787862][ T7132] [ 2930.801872][ T7138] BPF:[1] Invalid name_offset:72 09:58:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4a, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:50 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}, {0x10}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x4c, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2930.892910][ T7143] BPF:[1] DATASEC (anon) [ 2930.898138][ T7145] BPF:[1] FUNC_PROTO (anon) [ 2930.919957][ T7147] BPF:[1] INT (anon) [ 2930.925948][ T7143] BPF:size=0 vlen=6 [ 2930.942054][ T7147] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2930.947927][ T7143] BPF: [ 2930.956120][ T7150] BPF:Total section length too long [ 2930.963327][ T7143] BPF:size == 0 [ 2930.967920][ T7147] BPF: [ 2930.970777][ T7145] BPF:return=0 args=( [ 2930.981082][ T7147] BPF:nr_bits exceeds 128 [ 2930.987786][ T7143] BPF: [ 2930.987786][ T7143] [ 2930.993605][ T7151] BPF:Invalid string section [ 2930.994793][ T7153] BPF:Total section length too long [ 2931.007989][ T7145] BPF:0 (anon) [ 2931.011817][ T7147] BPF: [ 2931.011817][ T7147] [ 2931.022240][ T7145] BPF:, 4 (invalid-name-offset) 09:58:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3fe, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 2931.042752][ T7155] BPF:Invalid string section [ 2931.045041][ T7145] BPF:) [ 2931.068257][ T7145] BPF: [ 2931.070667][ T7156] BPF:[1] Invalid name_offset:76 [ 2931.074575][ T7145] BPF:Invalid arg#1 [ 2931.082254][ T7145] BPF: [ 2931.082254][ T7145] 09:58:51 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}, {0x12}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2931.126780][ T7159] BPF:[1] Invalid name_offset:76 09:58:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x12, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:51 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x60, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2931.212333][ T7164] BPF:Total section length too long [ 2931.219333][ T7165] BPF:[1] INT (anon) [ 2931.233456][ T7168] BPF:Total section length too long [ 2931.249089][ T7165] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2931.257302][ T7167] BPF:Invalid string section [ 2931.265510][ T7171] BPF:Invalid string section [ 2931.288257][ T7165] BPF: [ 2931.306062][ T7165] BPF:nr_bits exceeds 128 09:58:51 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}, {0xdb}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2931.336671][ T7165] BPF: [ 2931.336671][ T7165] [ 2931.380114][ T7176] BPF:[1] Invalid name_offset:96 09:58:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:58:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2931.408332][ T7177] BPF:[1] FUNC_PROTO (anon) [ 2931.427538][ T7183] BPF:[1] Invalid name_offset:96 [ 2931.462341][ T7182] BPF:Invalid string section [ 2931.471228][ T7177] BPF:return=0 args=( [ 2931.474718][ T7185] BPF:[1] INT (anon) [ 2931.495486][ T7185] BPF:size=0 bits_offset=9 nr_bits=0 encoding=(none) [ 2931.499782][ T7177] BPF:0 (anon) [ 2931.511871][ T7177] BPF:, 4 (invalid-name-offset) [ 2931.512409][ T7187] BPF:Invalid string section [ 2931.540982][ T7177] BPF:) [ 2931.541120][ T7185] BPF: [ 2931.543875][ T7177] BPF: [ 2931.549363][ T7185] BPF:nr_bits exceeds type_size [ 2931.557366][ T7191] BPF:[1] INT (anon) 09:58:51 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x68, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 2931.564579][ T7185] BPF: [ 2931.564579][ T7185] [ 2931.569259][ T7177] BPF:Invalid arg#1 [ 2931.583905][ T7177] BPF: [ 2931.583905][ T7177] [ 2931.589007][ T7192] BPF:[1] INT (anon) [ 2931.598686][ T7191] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) 09:58:51 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2931.622475][ T7194] BPF:[1] FUNC_PROTO (anon) [ 2931.643585][ T7192] BPF:size=0 bits_offset=9 nr_bits=0 encoding=(none) [ 2931.650423][ T7191] BPF: [ 2931.662329][ T7192] BPF: [ 2931.665198][ T7192] BPF:nr_bits exceeds type_size [ 2931.680133][ T7192] BPF: [ 2931.680133][ T7192] [ 2931.684669][ T7191] BPF:nr_bits exceeds 128 [ 2931.694180][ T7194] BPF:return=0 args=( [ 2931.715959][ T7191] BPF: [ 2931.715959][ T7191] [ 2931.722512][ T7194] BPF:0 (anon) [ 2931.734267][ T7194] BPF:, 4 (invalid-name-offset) [ 2931.741201][ T7200] BPF:[1] Invalid name_offset:104 [ 2931.747943][ T7194] BPF:) [ 2931.755151][ T7194] BPF: 09:58:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f00000000c0)=""/225, 0x0, 0xe1, 0x8}, 0x20) [ 2931.762998][ T7194] BPF:Invalid arg#1 [ 2931.772308][ T7194] BPF: [ 2931.772308][ T7194] [ 2931.777432][ T7204] BPF:[1] Invalid name_offset:104 09:58:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1d, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:51 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}, {0x0, [], 0x2}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:51 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x6c, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2931.862878][ T7207] BPF:[1] Invalid name_offset:2 [ 2931.925200][ T7210] BPF:hdr_len not found [ 2931.943051][ T7215] BPF:[1] Invalid name_offset:2 [ 2931.966089][ T7216] BPF:[1] INT (anon) [ 2931.970132][ T7216] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) 09:58:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f00000000c0)=""/225, 0x0, 0xe1, 0x8}, 0x20) [ 2932.037362][ T7216] BPF: [ 2932.040338][ T7219] BPF:[1] Invalid name_offset:108 [ 2932.043530][ T7221] BPF:Invalid string section [ 2932.056687][ T7216] BPF:nr_bits exceeds 128 [ 2932.063023][ T7225] BPF:[1] Invalid name_offset:108 [ 2932.078682][ T7224] BPF:Invalid string section [ 2932.083595][ T7223] BPF:[1] FUNC_PROTO (anon) [ 2932.090201][ T7216] BPF: [ 2932.090201][ T7216] [ 2932.097718][ T7223] BPF:return=0 args=( [ 2932.111265][ T7223] BPF:0 (anon) [ 2932.120652][ T7223] BPF:, 4 (invalid-name-offset) 09:58:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x74, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:52 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}, {0x0, [], 0x4}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2932.144140][ T7223] BPF:) [ 2932.146362][ T7229] BPF:[1] Invalid name_offset:3 [ 2932.151269][ T7223] BPF: [ 2932.166210][ T7223] BPF:Invalid arg#1 [ 2932.177084][ T7230] BPF:[1] Invalid name_offset:3 [ 2932.183915][ T7223] BPF: [ 2932.183915][ T7223] [ 2932.214590][ T7232] BPF:hdr_len not found 09:58:52 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2932.235215][ T7234] BPF:[1] FUNC_PROTO (anon) [ 2932.265564][ T7234] BPF:return=0 args=( 09:58:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2932.287273][ T7234] BPF:0 (anon) 09:58:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f00000000c0)=""/225, 0x0, 0xe1, 0x8}, 0x20) [ 2932.311254][ T7238] BPF:[1] Invalid name_offset:116 [ 2932.322254][ T7240] BPF:[1] INT (anon) [ 2932.329335][ T7234] BPF:, 4 (invalid-name-offset) [ 2932.331189][ T7240] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2932.355113][ T7242] BPF:Invalid string section [ 2932.375836][ T7234] BPF:) [ 2932.375856][ T7246] BPF:[1] Invalid name_offset:116 [ 2932.378732][ T7234] BPF: [ 2932.392550][ T7245] BPF:[1] Invalid name_offset:4 [ 2932.397967][ T7247] BPF:Invalid string section [ 2932.404630][ T7234] BPF:Invalid arg#1 [ 2932.418178][ T7240] BPF: [ 2932.418181][ T7234] BPF: [ 2932.418181][ T7234] [ 2932.426227][ T7250] BPF:[1] Invalid name_offset:4 09:58:52 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}, {0x0, [], 0x8}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:52 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x24, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2932.456293][ T7251] BPF:hdr_len not found [ 2932.456590][ T7240] BPF:nr_bits exceeds 128 09:58:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x7a, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2932.500158][ T7240] BPF: [ 2932.500158][ T7240] [ 2932.579973][ T7256] BPF:[1] FUNC_PROTO (anon) 09:58:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000000c0)=""/225, 0x1a, 0xe1, 0x8}, 0x20) 09:58:52 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2932.603281][ T7256] BPF:return=0 args=( [ 2932.609123][ T7258] BPF:Invalid string section [ 2932.625948][ T7256] BPF:0 (anon) [ 2932.653048][ T7262] BPF:Invalid string section [ 2932.666706][ T7256] BPF:, 4 (invalid-name-offset) [ 2932.675293][ T7260] BPF:[1] Invalid name_offset:122 [ 2932.694642][ T7256] BPF:) [ 2932.706123][ T7266] BPF:[1] Invalid name_offset:122 [ 2932.707969][ T7256] BPF: [ 2932.737646][ T7256] BPF:Invalid arg#1 [ 2932.748112][ T7256] BPF: [ 2932.748112][ T7256] 09:58:52 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}, {0x0, [], 0x10}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0xdb, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2932.758273][ T7268] BPF:No type found [ 2932.762924][ T7271] BPF:[1] Invalid name_offset:5 [ 2932.770346][ T7270] BPF:[1] INT (anon) [ 2932.777160][ T7270] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2932.787220][ T7272] BPF:[1] Invalid name_offset:5 [ 2932.792486][ T7273] BPF:[1] FUNC_PROTO (anon) [ 2932.797094][ T7273] BPF:return=0 args=( [ 2932.803705][ T7270] BPF: 09:58:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000000c0)=""/225, 0x1a, 0xe1, 0x8}, 0x20) [ 2932.843765][ T7270] BPF:nr_bits exceeds 128 [ 2932.857354][ T7270] BPF: [ 2932.857354][ T7270] [ 2932.876182][ T7277] BPF:Invalid string section 09:58:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2932.905606][ T7273] BPF:0 (anon) [ 2932.909045][ T7273] BPF:, 4 (invalid-name-offset) [ 2932.915260][ T7279] BPF:Invalid string section [ 2932.921223][ T7273] BPF:) [ 2932.924071][ T7273] BPF: 09:58:52 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2932.951244][ T7273] BPF:Invalid arg#1 [ 2932.963537][ T7281] BPF:No type found [ 2932.975324][ T7273] BPF: [ 2932.975324][ T7273] 09:58:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000000c0)=""/225, 0x1a, 0xe1, 0x8}, 0x20) [ 2933.011694][ T7286] BPF:[1] Invalid name_offset:6 [ 2933.018662][ T7285] BPF:[1] Invalid name_offset:219 [ 2933.026770][ T7287] BPF:[1] Invalid name_offset:6 09:58:53 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}, {0x0, [], 0x12}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2933.074852][ T7290] BPF:[1] Invalid name_offset:219 09:58:53 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x29, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2933.099848][ T7293] BPF:[1] INT (anon) [ 2933.123574][ T7293] BPF:size=0 bits_offset=0 nr_bits=219 encoding=(none) [ 2933.161322][ T7294] BPF:No type found [ 2933.167633][ T7293] BPF: 09:58:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x300, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2933.175473][ T7297] BPF:Invalid string section [ 2933.190722][ T7293] BPF:nr_bits exceeds 128 [ 2933.224684][ T7300] BPF:[1] FUNC_PROTO (anon) [ 2933.230466][ T7293] BPF: [ 2933.230466][ T7293] [ 2933.231117][ T7302] BPF:Invalid string section 09:58:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@union={0x0, 0x5, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}, {0x10, 0x4}]}]}}, &(0x7f00000000c0)=""/225, 0x62, 0xe1, 0x8}, 0x20) [ 2933.268784][ T7300] BPF:return=0 args=( [ 2933.281260][ T7300] BPF:0 (anon) [ 2933.292233][ T7300] BPF:, 4 (invalid-name-offset) [ 2933.307190][ T7300] BPF:) 09:58:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 2933.331219][ T7300] BPF: [ 2933.336551][ T7307] BPF:[1] Invalid name_offset:768 [ 2933.351337][ T7300] BPF:Invalid arg#1 [ 2933.366015][ T7300] BPF: [ 2933.366015][ T7300] [ 2933.390004][ T7309] BPF:[1] Invalid name_offset:768 [ 2933.395707][ T7313] BPF:[1] FUNC_PROTO (anon) [ 2933.411672][ T7308] BPF:[1] Invalid name_offset:7 [ 2933.416672][ T7313] BPF:return=0 args=( [ 2933.424420][ T7311] BPF:[1] DATASEC (anon) [ 2933.432577][ T7315] BPF:[1] Invalid name_offset:7 09:58:53 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}, {0x0, [], 0xdb}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x500, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2933.441243][ T7311] BPF:size=0 vlen=5 [ 2933.445205][ T7313] BPF:0 (anon) [ 2933.448862][ T7313] BPF:, 4 (invalid-name-offset) [ 2933.454036][ T7311] BPF: [ 2933.456887][ T7311] BPF:size == 0 [ 2933.461762][ T7313] BPF:) [ 2933.464541][ T7313] BPF: [ 2933.468557][ T7311] BPF: [ 2933.468557][ T7311] [ 2933.473940][ T7313] BPF:Invalid arg#1 [ 2933.479352][ T7313] BPF: [ 2933.479352][ T7313] 09:58:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:58:53 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x2b, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@union={0x0, 0x4, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}, {0xa, 0x5, 0x2}]}]}}, &(0x7f00000000c0)=""/225, 0x56, 0xe1, 0x8}, 0x20) [ 2933.572735][ T7320] BPF:Invalid string section [ 2933.598784][ T7322] BPF:[1] Invalid name_offset:1280 [ 2933.627291][ T7327] BPF:Invalid string section [ 2933.684169][ T7332] BPF:[1] Invalid name_offset:1280 [ 2933.693872][ T7333] BPF:[1] Invalid name_offset:8 [ 2933.719805][ T7336] BPF:[1] Invalid name_offset:8 09:58:53 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x7, 0xdc, 0x8}, 0x20) 09:58:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2933.753898][ T7335] BPF:[1] FUNC_PROTO (anon) [ 2933.758729][ T7335] BPF:return=0 args=( [ 2933.777390][ T7337] BPF:[1] DATASEC (anon) 09:58:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x600, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 2933.806626][ T7337] BPF:size=0 vlen=4 [ 2933.841576][ T7343] BPF:hdr_len not found [ 2933.846489][ T7337] BPF: [ 2933.855837][ T7335] BPF:0 (anon) [ 2933.867397][ T7337] BPF:size == 0 [ 2933.872122][ T7347] BPF:hdr_len not found [ 2933.873424][ T7335] BPF:, 4 (invalid-name-offset) [ 2933.878942][ T7346] BPF:[1] Invalid name_offset:10 09:58:53 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x18, 0xdc, 0x8}, 0x20) [ 2933.897949][ T7337] BPF: [ 2933.897949][ T7337] [ 2933.915054][ T7348] BPF:[1] Invalid name_offset:10 [ 2933.937350][ T7349] BPF:[1] Invalid name_offset:1536 [ 2933.937501][ T7335] BPF:) 09:58:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x10, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2933.964806][ T7335] BPF: [ 2933.970669][ T7352] BPF:[1] Invalid name_offset:1536 [ 2933.975782][ T7335] BPF:Invalid arg#1 [ 2933.997088][ T7335] BPF: [ 2933.997088][ T7335] 09:58:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@union={0x0, 0x3, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}, {0xf, 0x2, 0x3}]}]}}, &(0x7f00000000c0)=""/225, 0x4a, 0xe1, 0x8}, 0x20) 09:58:54 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000700)=""/220, 0x0, 0xdc, 0x8}, 0x20) [ 2934.024231][ T7356] BPF:[1] FUNC_PROTO (anon) [ 2934.030554][ T7355] BPF:No data [ 2934.049103][ T7358] BPF:No data [ 2934.079554][ T7356] BPF:return=0 args=( 09:58:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x1000000, 0xdc, 0x8}, 0x20) 09:58:54 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x700, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2934.156899][ T7356] BPF:0 (anon) [ 2934.191202][ T7356] BPF:, 4 (invalid-name-offset) [ 2934.200791][ T7366] BPF:[1] Invalid name_offset:16 [ 2934.205209][ T7364] BPF:[1] DATASEC (anon) [ 2934.217648][ T7356] BPF:) [ 2934.221306][ T7365] BPF:hdr_len not found [ 2934.223865][ T7364] BPF:size=0 vlen=3 [ 2934.227807][ T7356] BPF: [ 2934.236722][ T7364] BPF: [ 2934.239981][ T7372] BPF:[1] Invalid name_offset:16 [ 2934.247085][ T7356] BPF:Invalid arg#1 [ 2934.252408][ T7364] BPF:size == 0 [ 2934.263894][ T7356] BPF: [ 2934.263894][ T7356] [ 2934.267280][ T7364] BPF: [ 2934.267280][ T7364] [ 2934.283131][ T7373] BPF:[1] Invalid name_offset:1792 [ 2934.317596][ T7374] BPF:[1] Invalid name_offset:1792 09:58:54 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x32, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:54 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000700)=""/220, 0x0, 0xdc, 0x8}, 0x20) 09:58:54 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x12, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2934.337827][ T7368] BPF:Unsupported section found 09:58:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0x2, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}, {0xb, 0x2, 0x7fff}]}]}}, &(0x7f00000000c0)=""/225, 0x3e, 0xe1, 0x8}, 0x20) [ 2934.384488][ T7376] BPF:[1] FUNC_PROTO (anon) [ 2934.389333][ T7376] BPF:return=0 args=( [ 2934.415478][ T7376] BPF:0 (anon) 09:58:54 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0xa00, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2934.431275][ T7376] BPF:, 4 (invalid-name-offset) [ 2934.474103][ T7376] BPF:) [ 2934.491607][ T7382] BPF:hdr_len not found [ 2934.502268][ T7376] BPF: [ 2934.512342][ T7376] BPF:Invalid arg#1 [ 2934.527460][ T7376] BPF: [ 2934.527460][ T7376] [ 2934.545189][ T7384] BPF:[1] Invalid name_offset:18 [ 2934.558327][ T7388] BPF:[1] FUNC_PROTO (anon) 09:58:54 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, &(0x7f0000000700)=""/220, 0x0, 0xdc, 0x8}, 0x20) [ 2934.577117][ T7390] BPF:[1] DATASEC (anon) [ 2934.579834][ T7388] BPF:return=0 args=( [ 2934.586060][ T7388] BPF:0 (anon) [ 2934.591500][ T7391] BPF:[1] Invalid name_offset:18 [ 2934.593001][ T7388] BPF:, 4 (invalid-name-offset) [ 2934.605541][ T7390] BPF:size=0 vlen=2 [ 2934.607852][ T7388] BPF:) [ 2934.613984][ T7388] BPF: [ 2934.617012][ T7388] BPF:Invalid arg#1 [ 2934.621336][ T7388] BPF: [ 2934.621336][ T7388] 09:58:54 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x34, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2934.631978][ T7392] BPF:[1] Invalid name_offset:2560 [ 2934.637688][ T7390] BPF: [ 2934.640569][ T7390] BPF:size == 0 [ 2934.650197][ T7390] BPF: [ 2934.650197][ T7390] [ 2934.651123][ T7394] BPF:[1] Invalid name_offset:2560 09:58:54 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x48, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2934.698163][ T7389] BPF:Unsupported section found [ 2934.748724][ T7396] BPF:hdr_len not found 09:58:54 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0xc00, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0xf, 0x0, 0x0, [{0x10, 0x4, 0x6}]}]}}, &(0x7f00000000c0)=""/225, 0x32, 0xe1, 0x8}, 0x20) [ 2934.810730][ T7402] BPF:[1] FUNC_PROTO (anon) 09:58:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2000002a, 0xdc, 0x8}, 0x20) [ 2934.851144][ T7402] BPF:return=0 args=( [ 2934.855514][ T7402] BPF:0 (anon) [ 2934.859009][ T7402] BPF:, 4 (invalid-name-offset) [ 2934.878604][ T7401] BPF:[1] Invalid name_offset:72 09:58:54 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000700)=""/220, 0x1a, 0xdc, 0x8}, 0x20) [ 2934.901599][ T7402] BPF:) [ 2934.915080][ T7402] BPF: [ 2934.922736][ T7408] BPF:[1] DATASEC (anon) [ 2934.923009][ T7410] BPF:[1] Invalid name_offset:72 [ 2934.942409][ T7402] BPF:Invalid arg#1 [ 2934.943562][ T7406] BPF:[1] Invalid name_offset:3072 [ 2934.952053][ T7402] BPF: [ 2934.952053][ T7402] [ 2934.963886][ T7408] BPF:size=0 vlen=1 [ 2934.975707][ T7408] BPF: [ 2934.979269][ T7415] BPF:[1] Invalid name_offset:3072 [ 2934.989195][ T7408] BPF:size == 0 [ 2934.996387][ T7417] BPF:[1] FUNC_PROTO (anon) 09:58:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x10}, 0x20) [ 2935.010591][ T7417] BPF:return=0 args=( [ 2935.013962][ T7408] BPF: [ 2935.013962][ T7408] [ 2935.026865][ T7418] BPF:No type found [ 2935.033145][ T7417] BPF:0 (anon) [ 2935.046236][ T7417] BPF:, 4 (invalid-name-offset) 09:58:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0xf00, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x4c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f00000000c0)=""/225, 0x26, 0xe1, 0x8}, 0x20) [ 2935.067147][ T7417] BPF:) [ 2935.071497][ T7417] BPF: [ 2935.092499][ T7417] BPF:Invalid arg#1 [ 2935.096491][ T7417] BPF: [ 2935.096491][ T7417] 09:58:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000700)=""/220, 0x1a, 0xdc, 0x8}, 0x20) [ 2935.179256][ T7425] BPF:[1] Invalid name_offset:76 09:58:55 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x35, 0x4}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2935.236914][ T7431] BPF:[1] Invalid name_offset:76 [ 2935.253964][ T7430] BPF:[1] Invalid name_offset:3840 09:58:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x70) [ 2935.279796][ T7433] BPF:[1] DATASEC (anon) [ 2935.285550][ T7435] BPF:[1] Invalid name_offset:3840 [ 2935.309269][ T7433] BPF:size=0 vlen=0 09:58:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x60, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2935.331081][ T7433] BPF: [ 2935.334532][ T7433] BPF:vlen == 0 [ 2935.338165][ T7433] BPF: [ 2935.338165][ T7433] [ 2935.360059][ T7436] BPF:No type found [ 2935.360278][ T7440] BPF:[1] FUNC_PROTO (anon) 09:58:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1800, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f00000000c0)=""/225, 0x26, 0xe1, 0x8}, 0x20) [ 2935.406875][ T7440] BPF:return=0 args=( [ 2935.423954][ T7440] BPF:0 (anon) [ 2935.441279][ T7440] BPF:, 4 (invalid-name-offset) [ 2935.455719][ T7440] BPF:) 09:58:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000700)=""/220, 0x1a, 0xdc, 0x8}, 0x20) [ 2935.479374][ T7440] BPF: [ 2935.490739][ T7440] BPF:Invalid arg#1 [ 2935.521159][ T7445] BPF:[1] Invalid name_offset:96 [ 2935.540015][ T7440] BPF: [ 2935.540015][ T7440] 09:58:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0xfb) [ 2935.573799][ T7453] BPF:[1] FUNC_PROTO (anon) [ 2935.585951][ T7454] BPF:[1] Invalid name_offset:96 [ 2935.592965][ T7453] BPF:return=0 args=( [ 2935.599089][ T7455] BPF:[1] DATASEC (anon) [ 2935.607273][ T7456] BPF:No type found [ 2935.615393][ T7457] BPF:[1] Invalid name_offset:6144 09:58:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2935.640569][ T7453] BPF:0 (anon) [ 2935.644312][ T7459] BPF:[1] Invalid name_offset:6144 [ 2935.649596][ T7455] BPF:size=0 vlen=0 [ 2935.653634][ T7453] BPF:, 4 (invalid-name-offset) [ 2935.671284][ T7455] BPF: [ 2935.674267][ T7453] BPF:) 09:58:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x68, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2935.696993][ T7455] BPF:vlen == 0 [ 2935.709438][ T7455] BPF: [ 2935.709438][ T7455] [ 2935.711108][ T7453] BPF: [ 2935.720725][ T7453] BPF:Invalid arg#1 09:58:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x2000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2935.746790][ T7453] BPF: [ 2935.746790][ T7453] 09:58:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f00000000c0)=""/225, 0x26, 0xe1, 0x8}, 0x20) 09:58:55 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0x2}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2935.838129][ T7466] BPF:[1] Invalid name_offset:104 09:58:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2935.863995][ T7471] BPF:[1] Invalid name_offset:104 [ 2935.902589][ T7472] BPF:[1] Invalid name_offset:8192 [ 2935.939784][ T7477] BPF:[1] DATASEC (anon) 09:58:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0xfffb) [ 2935.953398][ T7478] BPF:[1] Invalid name_offset:8192 [ 2935.971023][ T7477] BPF:size=0 vlen=0 09:58:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2935.994544][ T7477] BPF: [ 2936.002878][ T7477] BPF:vlen == 0 [ 2936.015723][ T7477] BPF: [ 2936.015723][ T7477] 09:58:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2936.068201][ T7483] BPF:[1] FUNC_PROTO (anon) 09:58:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3f00, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0xf, 0x0, 0x0, [{0x0, 0x4, 0x6}]}]}}, &(0x7f00000000c0)=""/225, 0x32, 0xe1, 0x8}, 0x20) [ 2936.103726][ T7483] BPF:return=0 args=( [ 2936.136650][ T7483] BPF:0 (anon) [ 2936.166914][ T7483] BPF:, 2 (invalid-name-offset) 09:58:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20000420) [ 2936.191085][ T7483] BPF:) [ 2936.199709][ T7483] BPF: [ 2936.201327][ T7489] BPF:[1] Invalid name_offset:108 [ 2936.215234][ T7483] BPF:Invalid arg#1 [ 2936.219369][ T7500] BPF:[1] Invalid name_offset:108 [ 2936.232005][ T7498] BPF:[1] Invalid name_offset:16128 09:58:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, 0x0, 0x2a, 0x0, 0x8}, 0x20) [ 2936.241220][ T7483] BPF: [ 2936.241220][ T7483] [ 2936.253579][ T7501] BPF:[1] Invalid name_offset:16128 [ 2936.259622][ T7486] BPF:[1] FUNC_PROTO (anon) [ 2936.270173][ T7486] BPF:return=0 args=( [ 2936.277261][ T7499] BPF:[1] DATASEC (anon) 09:58:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x74, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2936.294072][ T7486] BPF:0 (anon) [ 2936.305246][ T7499] BPF:size=0 vlen=1 [ 2936.309129][ T7499] BPF: [ 2936.317452][ T7486] BPF:, 2 (invalid-name-offset) [ 2936.333110][ T7499] BPF:size == 0 [ 2936.336695][ T7499] BPF: [ 2936.336695][ T7499] 09:58:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0xfffffffb) 09:58:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x4000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2936.352980][ T7486] BPF:) [ 2936.355826][ T7486] BPF: [ 2936.358597][ T7486] BPF:Invalid arg#1 [ 2936.395785][ T7486] BPF: [ 2936.395785][ T7486] [ 2936.458295][ T7511] BPF:[1] Invalid name_offset:16384 [ 2936.528649][ T7518] BPF:[1] Invalid name_offset:16384 09:58:56 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0x3}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0xf, 0x0, 0x0, [{0x0, 0x0, 0x6}]}]}}, &(0x7f00000000c0)=""/225, 0x32, 0xe1, 0x8}, 0x20) 09:58:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, 0x0, 0x2a, 0x0, 0x8}, 0x20) [ 2936.561547][ T7519] BPF:[1] Invalid name_offset:116 [ 2936.590837][ T7524] BPF:[1] Invalid name_offset:116 09:58:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x4800, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2936.614900][ T7525] BPF:[1] DATASEC (anon) [ 2936.633318][ T7525] BPF:size=0 vlen=1 [ 2936.641763][ T7525] BPF: [ 2936.647029][ T7525] BPF:size == 0 [ 2936.652970][ T7525] BPF: [ 2936.652970][ T7525] 09:58:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0xfffffffffffffffb) 09:58:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, 0x0, 0x2a, 0x0, 0x8}, 0x20) 09:58:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x7a, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2936.706041][ T7529] BPF:[1] FUNC_PROTO (anon) 09:58:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0xf, 0x0, 0x0, [{}]}]}}, &(0x7f00000000c0)=""/225, 0x32, 0xe1, 0x8}, 0x20) [ 2936.758078][ T7529] BPF:return=0 args=( [ 2936.759238][ T7532] BPF:[1] Invalid name_offset:18432 [ 2936.775392][ T7529] BPF:0 (anon) [ 2936.781064][ T7529] BPF:, 3 (invalid-name-offset) [ 2936.811871][ T7529] BPF:) [ 2936.814807][ T7529] BPF: [ 2936.836252][ T7529] BPF:Invalid arg#1 [ 2936.839908][ T7540] BPF:[1] Invalid name_offset:18432 09:58:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc}, 0x20) [ 2936.864645][ T7543] BPF:[1] Invalid name_offset:122 [ 2936.871261][ T7529] BPF: [ 2936.871261][ T7529] [ 2936.897369][ T7547] BPF:[1] FUNC_PROTO (anon) [ 2936.905794][ T7548] BPF:[1] Invalid name_offset:122 [ 2936.923376][ T7547] BPF:return=0 args=( 09:58:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100180000000000000010000000100075a72b954bfb6fe09b449bcf7f4d1dc2000002000000000000ff00000000000000002a0000000000633ac39aea671c13482745ec63e219eb02dee00c3ab0a5dd551643aa79f85f8164b1f1597d5d98e725104cb2c3ed4a43dd70a7bfa52a499377df9be4e5fffd20296230a7b692f8"], &(0x7f0000000700)=""/220, 0x2a, 0xffffffffffffffc0, 0x8}, 0x20) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x1, 0x0, [], [{0x3, 0x9, 0x200, 0x3ff, 0x1000, 0x9}, {0x8, 0xe57, 0x92f6, 0x1, 0x10, 0x8}], [[]]}) r3 = accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000280)) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r4, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r4, 0x6628, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x18, 0x401, 0xffffff57, 0x2, 0x436, r4, 0x5, [], 0x0, r1, 0x0, 0x3}, 0x3c) 09:58:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x4c00, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2936.948131][ T7547] BPF:0 (anon) [ 2936.957329][ T7542] BPF:[1] DATASEC (anon) [ 2936.981239][ T7547] BPF:, 3 (invalid-name-offset) [ 2936.991062][ T7542] BPF:size=0 vlen=1 09:58:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0xdb, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2937.011321][ T7547] BPF:) [ 2937.016500][ T7542] BPF: [ 2937.019470][ T7547] BPF: [ 2937.036570][ T7547] BPF:Invalid arg#1 [ 2937.043998][ T7542] BPF:size == 0 [ 2937.053421][ T7547] BPF: [ 2937.053421][ T7547] [ 2937.060729][ T7542] BPF: [ 2937.060729][ T7542] 09:58:57 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0x5}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:57 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc}, 0x20) [ 2937.136480][ T7560] BPF:[1] Invalid name_offset:19456 [ 2937.150611][ T7561] BPF:[1] Invalid name_offset:219 [ 2937.160588][ T7563] BPF:[1] Invalid name_offset:19456 09:58:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0xf, 0x0, 0x0, [{}]}]}}, &(0x7f00000000c0)=""/225, 0x32, 0xe1, 0x8}, 0x20) [ 2937.196893][ T7565] BPF:[1] Invalid name_offset:219 09:58:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x6000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2937.282676][ T7571] BPF:[1] FUNC_PROTO (anon) 09:58:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x300, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:57 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0xdb}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc}, 0x20) [ 2937.327724][ T7571] BPF:return=0 args=( [ 2937.346664][ T7571] BPF:0 (anon) [ 2937.359762][ T7571] BPF:, 5 (invalid-name-offset) [ 2937.379693][ T7577] BPF:[1] DATASEC (anon) [ 2937.385394][ T7571] BPF:) [ 2937.397376][ T7571] BPF: [ 2937.408034][ T7577] BPF:size=0 vlen=1 [ 2937.413277][ T7571] BPF:Invalid arg#1 [ 2937.421770][ T7571] BPF: [ 2937.421770][ T7571] [ 2937.426411][ T7578] BPF:[1] Invalid name_offset:768 [ 2937.435856][ T7577] BPF: [ 2937.444767][ T7582] BPF:[1] FUNC_PROTO (anon) [ 2937.453495][ T7577] BPF:size == 0 [ 2937.458282][ T7581] BPF:[1] Invalid name_offset:24576 [ 2937.458866][ T7583] BPF:[1] Invalid name_offset:768 [ 2937.473797][ T7582] BPF:return=0 args=( [ 2937.477499][ T7577] BPF: 09:58:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f00000000c0)=""/31, 0x1f}, {0x0}, {0x0}], 0x3}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x26ba, 0x0, 0x0, 0x800e00517) shutdown(r0, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0xfe6a, 0x0, 0x0, 0x800e00521) shutdown(r1, 0x0) [ 2937.477499][ T7577] [ 2937.483983][ T7585] BPF:[1] Invalid name_offset:24576 [ 2937.498709][ T7582] BPF:0 (anon) [ 2937.510222][ T7582] BPF:, 5 (invalid-name-offset) [ 2937.521215][ T7582] BPF:) [ 2937.524164][ T7582] BPF: 09:58:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x500, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2937.540547][ T7582] BPF:Invalid arg#1 [ 2937.572375][ T7582] BPF: [ 2937.572375][ T7582] 09:58:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0xf, 0x0, 0x0, [{}]}]}}, 0x0, 0x32, 0x0, 0x8}, 0x20) [ 2937.688699][ T7593] BPF:[1] Invalid name_offset:1280 [ 2937.702327][ T7595] BPF:[1] Invalid name_offset:1280 09:58:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x6628, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x5}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r1, 0x401, 0xf41, 0x1, 0x2, 0x1}, &(0x7f0000000140)=0x14) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x6800, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:57 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0x6}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x600, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:57 executing program 5: poll(0x0, 0x0, 0x8000000000049) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffdd9, 0x42, 0x0, 0x800e00505) accept(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x100000114, 0x2, 0x0, 0x800e00510) shutdown(r0, 0x0) 09:58:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0xf, 0x0, 0x0, [{}]}]}}, 0x0, 0x32, 0x0, 0x8}, 0x20) [ 2937.969394][ T7612] BPF:[1] Invalid name_offset:26624 [ 2937.976401][ T7611] BPF:[1] Invalid name_offset:1536 [ 2937.983468][ T7615] BPF:[1] Invalid name_offset:26624 [ 2937.987117][ T7614] BPF:[1] FUNC_PROTO (anon) [ 2937.997420][ T7614] BPF:return=0 args=( [ 2938.002382][ T7617] BPF:[1] Invalid name_offset:1536 [ 2938.004323][ T7614] BPF:0 (anon) 09:58:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x6c00, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0xf, 0x0, 0x0, [{}]}]}}, 0x0, 0x32, 0x0, 0x8}, 0x20) [ 2938.015670][ T7614] BPF:, 6 (invalid-name-offset) [ 2938.027516][ T7614] BPF:) [ 2938.036653][ T7614] BPF: [ 2938.040722][ T7614] BPF:Invalid arg#1 [ 2938.049331][ T7614] BPF: [ 2938.049331][ T7614] 09:58:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x700, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2938.108485][ T7622] BPF:[1] FUNC_PROTO (anon) [ 2938.136315][ T7622] BPF:return=0 args=( 09:58:58 executing program 5: poll(&(0x7f0000000080)=[{}, {}, {}, {}, {}], 0x200000000000002b, 0x800000000004b) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x10201, 0x0, 0x0, 0x800e0051d) select(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x900000}, &(0x7f0000000140)={0x8}, 0x0) shutdown(r0, 0x0) 09:58:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0xf, 0x0, 0x0, [{}]}]}}, &(0x7f00000000c0)=""/225, 0x32, 0xe1}, 0x20) [ 2938.168117][ T7624] BPF:[1] Invalid name_offset:27648 [ 2938.171820][ T7622] BPF:0 (anon) [ 2938.191643][ T7629] BPF:[1] Invalid name_offset:1792 [ 2938.198092][ T7622] BPF:, 6 (invalid-name-offset) [ 2938.207963][ T7622] BPF:) [ 2938.231134][ T7622] BPF: [ 2938.237553][ T7632] BPF:[1] Invalid name_offset:27648 [ 2938.251420][ T7622] BPF:Invalid arg#1 [ 2938.263976][ T7634] BPF:[1] Invalid name_offset:1792 [ 2938.297030][ T7622] BPF: [ 2938.297030][ T7622] 09:58:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x7400, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2938.452998][ T7646] BPF:[1] Invalid name_offset:29696 [ 2938.517385][ T7650] BPF:[1] Invalid name_offset:29696 09:58:58 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x6628, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x6628, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r2, 0x800443d2, &(0x7f0000000100)={0x4, &(0x7f0000000440)=[{}, {}, {}, {}]}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") epoll_pwait(r1, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x3, &(0x7f00000003c0)={0x6}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000001000000028000000020000000000000000000001000000000000000000002f175c65998c9b1d6d1cc87cb0b735b291108a81a1d1c037fdbecdb32e2ede59470ae765fb3106c05c9f69a60b64af9574cc7a3448d0c5355991808ac2fa2391d94b2fd50c9c2c40087b061dcd99c8d448ff4ab6bb36ca96a32185e12ee9e28b89797d7894703227c22318e758a054c8aaa249fb57e9e0cc3e7df83a3a11321879ef436d0c35237b0c2df15eb9870638"], &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0xa00, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:58 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0x7}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0xf, 0x0, 0x0, [{}]}]}}, &(0x7f00000000c0)=""/225, 0x32, 0xe1}, 0x20) 09:58:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000024c0)=[{&(0x7f0000000080)=""/53, 0x35}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x40002) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x26ba, 0x0, 0x0, 0x800e00517) shutdown(r0, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/30, 0x1e}, {0x0}, {0x0}], 0x3}, 0x0) shutdown(r1, 0x0) 09:58:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x7a00, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2938.794738][ T7657] BPF:[1] FUNC_PROTO (anon) [ 2938.806941][ T7658] BPF:[1] Invalid name_offset:31232 [ 2938.813764][ T7657] BPF:return=0 args=( [ 2938.819143][ T7660] BPF:[1] Invalid name_offset:2560 [ 2938.829012][ T7657] BPF:0 (anon) [ 2938.829198][ T7662] BPF:[1] Invalid name_offset:31232 [ 2938.837174][ T7657] BPF:, 7 (invalid-name-offset) 09:58:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0xf, 0x0, 0x0, [{}]}]}}, &(0x7f00000000c0)=""/225, 0x32, 0xe1}, 0x20) [ 2938.843666][ T7663] BPF:[1] Invalid name_offset:2560 [ 2938.858994][ T7657] BPF:) [ 2938.869872][ T7657] BPF: [ 2938.882049][ T7657] BPF:Invalid arg#1 09:58:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x1200, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0xdb00, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2938.895027][ T7657] BPF: [ 2938.895027][ T7657] [ 2938.941541][ T7668] BPF:[1] FUNC_PROTO (anon) 09:58:59 executing program 5: poll(&(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) r1 = socket$inet_udplite(0x2, 0x2, 0x88) accept(r1, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x22b41b9a8748acb4, 0x0, 0x0, 0x800e0050e) shutdown(r0, 0x0) shutdown(r1, 0x0) [ 2938.998314][ T7673] BPF:[1] Invalid name_offset:4608 [ 2939.008767][ T7668] BPF:return=0 args=( [ 2939.028528][ T7675] BPF:[1] Invalid name_offset:4608 [ 2939.040533][ T7676] BPF:[1] Invalid name_offset:56064 [ 2939.055400][ T7668] BPF:0 (anon) [ 2939.058918][ T7668] BPF:, 7 (invalid-name-offset) [ 2939.064027][ T7677] BPF:[1] Invalid name_offset:56064 09:58:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000600)=[{&(0x7f0000000380)=""/165, 0xa5}, {0x0}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00527) shutdown(r0, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0xfde6, 0x42, 0x0, 0x800e00521) shutdown(r1, 0x0) [ 2939.101968][ T7668] BPF:) 09:58:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0xffffff, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2939.125557][ T7668] BPF: [ 2939.128391][ T7668] BPF:Invalid arg#1 [ 2939.189325][ T7668] BPF: [ 2939.189325][ T7668] [ 2939.270138][ T7691] BPF:Invalid section offset [ 2939.288476][ T7690] BPF:[1] Invalid name_offset:16777215 [ 2939.316740][ T7694] BPF:[1] Invalid name_offset:16777215 09:58:59 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000002c0), 0xfefe) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f00000000c0)='caif0\x00') sendfile(r3, r4, &(0x7f0000000000), 0xffe) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000080)={r3, 0x0, 0x401, 0x8, 0x2}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r6, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r6, 0x6628, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000000800)=ANY=[@ANYBLOB="08000000000000000a004e230000020000000000000000000000000000000001070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000a004e2300000400000000000000000000000000000000000900000000000000000000000000000000000000fe00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2300000008fe8000000000000000000000000000aa40000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e200000bed000000000000000000000ffffac1e000101000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2300000007fe80000000000000000000000000002400080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e20ffffffff00000000000000000000ffffe000000149d02000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e210000000200000000000000000000000000000001e08d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e23000000090000000000000000000000000000000101000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e210000007c000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000001700"/1168], 0x490) 09:58:59 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @random="06134417ea20", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f0000000040), 0xb) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e007b6) 09:58:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0xa}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:58:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x2000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:58:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:58:59 executing program 0: poll(0x0, 0x0, 0x8000000000049) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xa4d, 0x0, 0x0, 0x800e003ce) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000080)=""/148, 0x94}, {0x0}, {0x0}, {0x0}], 0x4}, 0x2) shutdown(r0, 0x0) [ 2939.624678][ T7691] BPF:Invalid section offset [ 2939.661098][ T7703] BPF:[1] Invalid name_offset:8192 [ 2939.681414][ T7705] BPF:[1] FUNC_PROTO (anon) [ 2939.686073][ T7705] BPF:return=0 args=( [ 2939.690060][ T7705] BPF:0 (anon) [ 2939.695873][ T7709] BPF:[1] Invalid name_offset:8192 [ 2939.699059][ T7705] BPF:, 10 (invalid-name-offset) [ 2939.706306][ T7705] BPF:) [ 2939.709418][ T7705] BPF: [ 2939.722318][ T7711] BPF:[1] Invalid name_offset:16777216 [ 2939.727932][ T7705] BPF:Invalid arg#1 09:58:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x3f00, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2939.742780][ T7705] BPF: [ 2939.742780][ T7705] [ 2939.750464][ T7713] BPF:[1] Invalid name_offset:16777216 [ 2939.772952][ T7714] BPF:[1] FUNC_PROTO (anon) [ 2939.783480][ T7714] BPF:return=0 args=( [ 2939.798850][ T7714] BPF:0 (anon) [ 2939.817471][ T7714] BPF:, 10 (invalid-name-offset) [ 2939.827292][ T7718] BPF:[1] Invalid name_offset:16128 [ 2939.839978][ T7714] BPF:) [ 2939.846591][ T7714] BPF: 09:58:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x2000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2939.853050][ T7714] BPF:Invalid arg#1 [ 2939.862826][ T7714] BPF: [ 2939.862826][ T7714] [ 2939.872476][ T7721] BPF:[1] Invalid name_offset:16128 09:58:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000300)=""/160, 0xa0}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000000)={0x100}, 0x10) accept$inet(r2, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0051e) shutdown(r1, 0x0) shutdown(r2, 0x0) 09:58:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0x12}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2939.980707][ T7727] BPF:[1] Invalid name_offset:33554432 [ 2940.010832][ T7732] BPF:[1] Invalid name_offset:33554432 09:59:00 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:59:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2940.059790][ T7735] BPF:[1] FUNC_PROTO (anon) [ 2940.077439][ T7735] BPF:return=0 args=( [ 2940.091454][ T7735] BPF:0 (anon) [ 2940.099389][ T7735] BPF:, 18 (invalid-name-offset) [ 2940.110222][ T7735] BPF:) [ 2940.120256][ T7735] BPF: [ 2940.130331][ T7735] BPF:Invalid arg#1 [ 2940.144466][ T7735] BPF: [ 2940.144466][ T7735] [ 2940.160185][ T7741] BPF:[1] Invalid name_offset:50331648 [ 2940.170353][ T7742] BPF:[1] FUNC_PROTO (anon) [ 2940.176470][ T7743] BPF:[1] Invalid name_offset:50331648 [ 2940.209495][ T7742] BPF:return=0 args=( [ 2940.215914][ T7745] BPF:[1] Invalid name_offset:16384 [ 2940.227572][ T7746] BPF:[1] Invalid name_offset:16384 [ 2940.227775][ T7742] BPF:0 (anon) [ 2940.237366][ T7742] BPF:, 18 (invalid-name-offset) [ 2940.247158][ T7742] BPF:) [ 2940.250085][ T7742] BPF: [ 2940.296952][ T7742] BPF:Invalid arg#1 [ 2940.312176][ T7742] BPF: [ 2940.312176][ T7742] 09:59:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x1006, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x97ae3427, 0x0, 0x0, 0x800e00567) shutdown(r0, 0x0) 09:59:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x4000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:59:00 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x4800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:59:00 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0x1d}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:59:00 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket(0x1b, 0xa, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x6628, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01000000000000000000030000001400010010000100756470d1866f94a6490fef3a"], 0x28}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20403061}, 0xc, &(0x7f00000000c0)={&(0x7f0000000800)={0x24c, r4, 0x68b9d917097b19f3, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4ac}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffff56e}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffe}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x30a}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x101}]}, @TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}]}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_MEDIA={0xb8, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x95}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}]}, @TIPC_NLA_MEDIA={0x70, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x500000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xaee9}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x703}]}]}, @TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xad69000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}]}, 0x24c}, 0x1, 0x0, 0x0, 0xe6eb87cace6e2ecb}, 0x84000) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000480)={r7}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000080)={r7, 0xa9}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:59:00 executing program 5: poll(&(0x7f0000000040), 0x4e4, 0x800000000004b) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x5d9, 0x0, 0x0, 0x800e004e5) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x800000000004c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x24f, 0x0, 0x0, 0x800e004de) poll(&(0x7f0000000040)=[{}], 0x1, 0xdb) shutdown(r1, 0x0) shutdown(r0, 0x0) [ 2940.579903][ T7755] BPF:[1] FUNC_PROTO (anon) [ 2940.589645][ T7757] BPF:[1] Invalid name_offset:67108864 [ 2940.604740][ T7759] BPF:[1] Invalid name_offset:18432 [ 2940.606161][ T7755] BPF:return=0 args=( [ 2940.616005][ T7755] BPF:0 (anon) [ 2940.620475][ T7761] BPF:[1] Invalid name_offset:67108864 [ 2940.635558][ T7762] BPF:[1] Invalid name_offset:18432 [ 2940.648841][ T7755] BPF:, 29 (invalid-name-offset) [ 2940.664226][ T7755] BPF:) [ 2940.674920][ T7755] BPF: 09:59:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x5000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2940.686863][ T7755] BPF:Invalid arg#1 [ 2940.701560][ T7755] BPF: [ 2940.701560][ T7755] 09:59:00 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) poll(&(0x7f0000000180)=[{r0, 0x36}, {r0}], 0x2, 0x0) poll(&(0x7f0000000080)=[{r0, 0x5}], 0x1, 0x4e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x1000004d7, 0x0, 0x0, 0x800e00aa1) shutdown(r1, 0x0) 09:59:00 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x4c00, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2940.748942][ T7768] BPF:[1] FUNC_PROTO (anon) [ 2940.779899][ T7768] BPF:return=0 args=( [ 2940.801288][ T7768] BPF:0 (anon) [ 2940.805150][ T7768] BPF:, 29 (invalid-name-offset) [ 2940.826606][ T7772] BPF:[1] Invalid name_offset:83886080 [ 2940.845429][ T7768] BPF:) [ 2940.853979][ T7768] BPF: [ 2940.857141][ T7768] BPF:Invalid arg#1 [ 2940.870237][ T7777] BPF:[1] Invalid name_offset:83886080 [ 2940.878776][ T7768] BPF: [ 2940.878776][ T7768] [ 2940.895924][ T7779] BPF:[1] Invalid name_offset:19456 09:59:00 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0x24}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:59:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x6000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2940.957272][ T7787] BPF:[1] Invalid name_offset:19456 [ 2941.022854][ T7791] BPF:[1] FUNC_PROTO (anon) [ 2941.029578][ T7791] BPF:return=0 args=( [ 2941.047516][ T7791] BPF:0 (anon) 09:59:01 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x6000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2941.074029][ T7785] Enabling of bearer rejected, illegal name [ 2941.079203][ T7791] BPF:, 36 (invalid-name-offset) [ 2941.096647][ T7791] BPF:) [ 2941.099599][ T7791] BPF: [ 2941.104247][ T7791] BPF:Invalid arg#1 [ 2941.108265][ T7791] BPF: [ 2941.108265][ T7791] 09:59:01 executing program 5: poll(&(0x7f0000000080)=[{}], 0x1, 0x800000000004b) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000000)={0x5}, 0x10) recvfrom$inet(r0, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x10201, 0x0, 0x0, 0x800e0051d) shutdown(r0, 0x0) 09:59:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001580)=[{&(0x7f0000000040)=""/139, 0x8b}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x185}], 0xd6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x48, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x10000020a, 0x6, 0x0, 0x800e00521) shutdown(r1, 0x0) [ 2941.129765][ T7795] BPF:[1] Invalid name_offset:100663296 [ 2941.168506][ T7802] BPF:[1] FUNC_PROTO (anon) [ 2941.172225][ T7803] BPF:[1] Invalid name_offset:100663296 [ 2941.199521][ T7801] BPF:[1] Invalid name_offset:24576 [ 2941.210160][ T7802] BPF:return=0 args=( [ 2941.254215][ T7802] BPF:0 (anon) [ 2941.263980][ T7809] BPF:[1] Invalid name_offset:24576 [ 2941.279798][ T7802] BPF:, 36 (invalid-name-offset) 09:59:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x7000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:59:01 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x6800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2941.302205][ T7802] BPF:) [ 2941.308727][ T7802] BPF: [ 2941.323214][ T7802] BPF:Invalid arg#1 [ 2941.334110][ T7802] BPF: [ 2941.334110][ T7802] [ 2941.408386][ T7817] BPF:[1] Invalid name_offset:117440512 [ 2941.427766][ T7820] BPF:[1] Invalid name_offset:117440512 [ 2941.475459][ T7824] BPF:[1] Invalid name_offset:26624 [ 2941.502454][ T7826] BPF:[1] Invalid name_offset:26624 09:59:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/100, 0x64}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x2) recvfrom$inet(r1, 0x0, 0x2769, 0x0, 0x0, 0x800e00505) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/162, 0xa2}, {0x0}, {0x0}], 0xa) shutdown(r1, 0x0) shutdown(r2, 0x0) 09:59:01 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0x29}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:59:01 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x6c00, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:59:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000b40)=[{&(0x7f00000004c0)=""/135, 0x87}, {0x0}, {0x0}], 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) shutdown(r0, 0x0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r2, &(0x7f00000006c0)=[{&(0x7f0000000040)=""/106, 0x6a}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) shutdown(r1, 0x0) 09:59:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x8000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2941.772046][ T7785] Enabling of bearer rejected, illegal name 09:59:01 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r4, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r4, 0x6628, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) write$cgroup_int(r3, &(0x7f00000002c0)=0xfffffffffffffffc, 0x97) sendfile(r2, r3, &(0x7f0000000000), 0xffe) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89ff, &(0x7f0000000540)="9a16e0789ea4ce2ea0d642c9c303d0ccfc63e7fa60e30ef180ad3e098616bc6f1d073efe625dbc06a2d57d0d0e9d5f7d696c45f0fa380deeeff5641df89f8391c990eeadb6c6518187c523a9267209754f7af95a50e2e2678fed4b93d678c336e77f6a3604f4df3cd890a9468108139789ea4974dc29fbc8c2328ef080f6a0c4fe9658b5e67c2a5506019f129380782edf123714371c9b7121c2f22ec8580e54188b6a3bb240f1") ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000240)={0x662, 0x7f, 0x1, 0x3, 0x6, [{0xb470, 0x80000001, 0x0, 0x0, 0x0, 0x400}, {0x80000001, 0xa276, 0x2, 0x0, 0x0, 0x2600}, {0x6, 0x7fffffff, 0x5627, 0x0, 0x0, 0x200}, {0x1, 0x7, 0x10000, 0x0, 0x0, 0x180}, {0x9, 0x3, 0x10001, 0x0, 0x0, 0x481}, {0x5, 0x4cae66ee, 0x400, 0x0, 0x0, 0x1000}]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb000000000010000000100000002a15b6163cc05fae00000001000041de54800000090000006e302e7f48aa6da67dac8789b25971770c325d82f37f2c3777ea0a0000ee1dca212557308f940469c6cb57690eb675eb4d13410d77ce7dc2891277ce0e7a0b1878a0ae35f9ea413f716cbb4a0bbf356a670c0100010000000000250b4d919a9906870620ea65ea0ecf0bf500473a9bebabcbc7df2b52130d6789f544d0c5445370db5f4435b6047d8fac62df3e"], &(0x7f00000006c0)=""/223, 0xfffffffffffffdd9, 0x5287c15c3f32500c, 0x8}, 0x20) [ 2941.832792][ T7836] BPF:[1] FUNC_PROTO (anon) [ 2941.851248][ T7840] BPF:[1] Invalid name_offset:134217728 [ 2941.861126][ T7836] BPF:return=0 args=( [ 2941.870068][ T7843] BPF:[1] Invalid name_offset:27648 [ 2941.878019][ T7836] BPF:0 (anon) 09:59:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0xa000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2941.883389][ T7845] BPF:[1] Invalid name_offset:134217728 [ 2941.888609][ T7846] BPF:[1] Invalid name_offset:27648 [ 2941.895876][ T7836] BPF:, 41 (invalid-name-offset) [ 2941.911844][ T7836] BPF:) [ 2941.920420][ T7836] BPF: 09:59:01 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x7400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2941.958191][ T7836] BPF:Invalid arg#1 [ 2941.984753][ T7836] BPF: [ 2941.984753][ T7836] [ 2942.014159][ T7854] BPF:[1] FUNC_PROTO (anon) 09:59:02 executing program 5: poll(&(0x7f0000000000), 0x33, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffd26, 0x0, 0x0, 0x800e0070d) r1 = socket$inet_udplite(0x2, 0x2, 0x88) select(0x40, &(0x7f0000000000)={0x1}, 0x0, &(0x7f0000000080)={0x8}, 0x0) ppoll(&(0x7f0000000140)=[{r1}], 0x1, &(0x7f0000000180)={0x7e400000000}, 0x0, 0x0) shutdown(r0, 0x0) [ 2942.061624][ T7854] BPF:return=0 args=( [ 2942.067284][ T7856] BPF:[1] Invalid name_offset:167772160 [ 2942.068574][ T7860] BPF:[1] Invalid name_offset:29696 [ 2942.097092][ T7862] BPF:[1] Invalid name_offset:29696 [ 2942.102139][ T7854] BPF:0 (anon) [ 2942.115132][ T7864] BPF:[1] Invalid name_offset:167772160 [ 2942.141639][ T7854] BPF:, 41 (invalid-name-offset) 09:59:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/243, 0xf3}, {0x0}, {0x0}], 0x3}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000240)=[{&(0x7f0000000580)=""/194, 0xc2}, {0x0}], 0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r2, 0x0) r4 = socket$inet6_sctp(0x1c, 0x10000000003, 0x84) readv(r4, &(0x7f0000000ac0)=[{&(0x7f00000004c0)=""/147, 0x93}, {0x0}, {0x0}], 0x3) shutdown(r3, 0x0) shutdown(r1, 0x0) 09:59:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0xc000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:59:02 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x7a00, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2942.171201][ T7854] BPF:) [ 2942.175204][ T7854] BPF: [ 2942.186943][ T7854] BPF:Invalid arg#1 [ 2942.203855][ T7854] BPF: [ 2942.203855][ T7854] 09:59:02 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0x2b}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2942.381194][ T7880] BPF:[1] Invalid name_offset:31232 [ 2942.388040][ T7883] BPF:[1] FUNC_PROTO (anon) [ 2942.401602][ T7884] BPF:[1] Invalid name_offset:31232 [ 2942.417607][ T7885] BPF:[1] Invalid name_offset:201326592 [ 2942.418428][ T7883] BPF:return=0 args=( [ 2942.428017][ T7883] BPF:0 (anon) 09:59:02 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0xdb00, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2942.438056][ T7883] BPF:, 43 (invalid-name-offset) [ 2942.443744][ T7883] BPF:) [ 2942.447248][ T7886] BPF:[1] Invalid name_offset:201326592 [ 2942.460464][ T7883] BPF: [ 2942.466292][ T7883] BPF:Invalid arg#1 [ 2942.483414][ T7883] BPF: [ 2942.483414][ T7883] 09:59:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0xf000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2942.515368][ T7892] BPF:[1] Invalid name_offset:56064 [ 2942.523072][ T7890] BPF:[1] FUNC_PROTO (anon) [ 2942.529275][ T7893] BPF:[1] Invalid name_offset:56064 [ 2942.550052][ T7890] BPF:return=0 args=( [ 2942.561060][ T7890] BPF:0 (anon) [ 2942.567804][ T7890] BPF:, 43 (invalid-name-offset) [ 2942.584860][ T7890] BPF:) [ 2942.588360][ T7898] BPF:[1] Invalid name_offset:251658240 [ 2942.595934][ T7890] BPF: [ 2942.604692][ T7890] BPF:Invalid arg#1 09:59:02 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0xffffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:59:02 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0x32}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2942.616697][ T7890] BPF: [ 2942.616697][ T7890] [ 2942.627875][ T7899] BPF:[1] Invalid name_offset:251658240 [ 2942.757419][ T7904] BPF:[1] Invalid name_offset:16777215 [ 2942.787354][ T7906] BPF:[1] FUNC_PROTO (anon) [ 2942.817622][ T7908] BPF:[1] Invalid name_offset:16777215 [ 2942.818303][ T7906] BPF:return=0 args=( [ 2942.841136][ T7906] BPF:0 (anon) [ 2942.851070][ T7906] BPF:, 50 (invalid-name-offset) [ 2942.863671][ T7906] BPF:) 09:59:02 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100189c4201a8114c04000000000000100000001000000002000000000000000000164a5053000016000008ecc5c59f44e8785b3a09b2a93517c74bdb6d1c0782eb75ac5e5e83f26450c422c1"], &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:59:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r1, &(0x7f0000001800)=[{&(0x7f0000000000)=""/18, 0x12}, {0x0}], 0x2) recvfrom$inet(r2, 0x0, 0xced5, 0x0, 0x0, 0x800e0085d) shutdown(r1, 0x0) readv(r0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/22, 0x16}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) shutdown(r2, 0x0) 09:59:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x18000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2942.871159][ T7906] BPF: [ 2942.876049][ T7906] BPF:Invalid arg#1 [ 2942.888039][ T7906] BPF: [ 2942.888039][ T7906] [ 2942.907544][ T7909] BPF:[1] FUNC_PROTO (anon) [ 2942.913711][ T7909] BPF:return=0 args=( [ 2942.917832][ T7909] BPF:0 (anon) [ 2942.939312][ T7909] BPF:, 50 (invalid-name-offset) [ 2942.943887][ T7912] BPF:[1] Invalid name_offset:402653184 [ 2942.965979][ T7915] BPF:[1] Invalid name_offset:402653184 [ 2942.976437][ T7909] BPF:) [ 2942.981875][ T7909] BPF: [ 2942.984789][ T7909] BPF:Invalid arg#1 [ 2942.988709][ T7909] BPF: [ 2942.988709][ T7909] 09:59:03 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0x5, 0x0, &(0x7f0000000040)) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00361) 09:59:03 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x1000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:59:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x20000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:59:03 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0x34}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2943.055852][ T7920] BPF:btf_header not found [ 2943.062321][ T7922] BPF:btf_header not found 09:59:03 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@int={0x20}]}, {0x0, [0x5f, 0x61]}}, &(0x7f0000000700)=""/220, 0x2c, 0xdc, 0x8}, 0x20) [ 2943.139722][ T7927] BPF:[1] Invalid name_offset:16777216 [ 2943.149740][ T7928] BPF:[1] Invalid name_offset:536870912 [ 2943.175394][ T7932] BPF:[1] Invalid name_offset:16777216 [ 2943.179743][ T7930] BPF:[1] Invalid name_offset:536870912 09:59:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3f000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2943.221401][ T7935] BPF:[1] FUNC_PROTO (anon) [ 2943.237143][ T7935] BPF:return=0 args=( [ 2943.247155][ T7935] BPF:0 (anon) 09:59:03 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x2000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2943.268642][ T7935] BPF:, 52 (invalid-name-offset) [ 2943.277679][ T7938] BPF:[1] Invalid name_offset:32 [ 2943.303817][ T7939] BPF:[1] Invalid name_offset:32 [ 2943.310713][ T7935] BPF:) [ 2943.322831][ T7935] BPF: [ 2943.334879][ T7935] BPF:Invalid arg#1 [ 2943.348214][ T7935] BPF: [ 2943.348214][ T7935] [ 2943.358217][ T7943] BPF:[1] Invalid name_offset:1056964608 [ 2943.372794][ T7944] BPF:[1] FUNC_PROTO (anon) [ 2943.388730][ T7944] BPF:return=0 args=( [ 2943.401620][ T7946] BPF:[1] Invalid name_offset:33554432 [ 2943.405721][ T7944] BPF:0 (anon) [ 2943.407371][ T7947] BPF:[1] Invalid name_offset:1056964608 09:59:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x6628, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, 0x0, 0x0, 0x1, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xd7a9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7bc3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffff}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x56fb}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4801}, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000fa2272a876fd446f7c067db193999004b22d331000000010000000020000"], &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2943.420759][ T7944] BPF:, 52 (invalid-name-offset) [ 2943.434600][ T7949] BPF:[1] Invalid name_offset:33554432 [ 2943.452064][ T7944] BPF:) [ 2943.459535][ T7944] BPF: 09:59:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x40000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2943.470606][ T7944] BPF:Invalid arg#1 [ 2943.482865][ T7944] BPF: [ 2943.482865][ T7944] 09:59:03 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0x35}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2943.532754][ T7954] BPF:[1] Invalid name_offset:1073741824 [ 2943.540540][ T7955] BPF:[1] Invalid name_offset:1073741824 [ 2943.553428][ T7956] BPF:Total section length too long [ 2943.640607][ T7960] BPF:[1] FUNC_PROTO (anon) [ 2943.647506][ T7960] BPF:return=0 args=( [ 2943.663512][ T7960] BPF:0 (anon) [ 2943.672958][ T7960] BPF:, 53 (invalid-name-offset) [ 2943.685909][ T7960] BPF:) [ 2943.692376][ T7960] BPF: [ 2943.698718][ T7960] BPF:Invalid arg#1 [ 2943.707203][ T7960] BPF: [ 2943.707203][ T7960] [ 2943.731296][ T7962] BPF:[1] FUNC_PROTO (anon) [ 2943.758731][ T7962] BPF:return=0 args=( [ 2943.770442][ T7962] BPF:0 (anon) [ 2943.777735][ T7962] BPF:, 53 (invalid-name-offset) [ 2943.786091][ T7962] BPF:) [ 2943.789038][ T7962] BPF: [ 2943.795108][ T7962] BPF:Invalid arg#1 [ 2943.799070][ T7962] BPF: [ 2943.799070][ T7962] 09:59:03 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xc68, 0x0, 0x0, 0x800e0047e) readv(r0, &(0x7f0000001340)=[{&(0x7f0000000200)=""/45, 0x2d}, {0x0}], 0x2) shutdown(r0, 0x0) 09:59:03 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x3000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2943.915152][ T7968] BPF:[1] Invalid name_offset:50331648 [ 2943.937899][ T7971] BPF:[1] Invalid name_offset:50331648 09:59:03 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) poll(&(0x7f00000000c0)=[{}, {}, {}, {r0}, {}, {}, {r0}], 0x7, 0x40) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffecb, 0x0, 0x0, 0x800e00515) poll(0x0, 0x0, 0xff) shutdown(r1, 0x0) 09:59:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x48000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:59:03 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0x700}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:59:03 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x4000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2944.049030][ T7977] BPF:[1] FUNC_PROTO (anon) [ 2944.062882][ T7981] BPF:[1] Invalid name_offset:1207959552 [ 2944.068683][ T7977] BPF:return=0 args=( [ 2944.080469][ T7980] BPF:[1] Invalid name_offset:67108864 [ 2944.085869][ T7984] BPF:[1] Invalid name_offset:1207959552 [ 2944.087122][ T7956] BPF:Total section length too long [ 2944.094240][ T7977] BPF:0 (anon) [ 2944.102424][ T7977] BPF:, 1792 (invalid-name-offset) [ 2944.117347][ T7986] BPF:[1] Invalid name_offset:67108864 [ 2944.138106][ T7977] BPF:) [ 2944.146667][ T7977] BPF: 09:59:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_int(r1, 0x0, 0x3271d6cb38227f64, &(0x7f0000000080), &(0x7f00000000c0)=0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:59:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x5000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2944.157395][ T7977] BPF:Invalid arg#1 09:59:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/12, 0xc}, {0x0}, {0x0}], 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffdd9, 0x0, 0x0, 0x800e00505) shutdown(r0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) recvfrom$inet(r1, 0x0, 0x100000114, 0x0, 0x0, 0x800e00510) shutdown(r1, 0x0) 09:59:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x4c000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2944.190137][ T7977] BPF: [ 2944.190137][ T7977] [ 2944.219205][ T7992] BPF:[1] FUNC_PROTO (anon) [ 2944.221515][ T7993] BPF:[1] Invalid name_offset:83886080 [ 2944.261137][ T7992] BPF:return=0 args=( [ 2944.299706][ T8000] BPF:[1] Invalid name_offset:1275068416 [ 2944.304093][ T8001] BPF:[1] Invalid name_offset:83886080 [ 2944.325773][ T7992] BPF:0 (anon) [ 2944.329718][ T8002] BPF:[1] Invalid name_offset:1275068416 09:59:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x6000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2944.348099][ T7992] BPF:, 1792 (invalid-name-offset) 09:59:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x60000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2944.377005][ T7992] BPF:) [ 2944.405219][ T7992] BPF: [ 2944.422676][ T7992] BPF:Invalid arg#1 [ 2944.430153][ T8008] BPF:[1] Invalid name_offset:100663296 [ 2944.450503][ T7992] BPF: [ 2944.450503][ T7992] 09:59:04 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0xc00}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2944.451273][ T8010] BPF:[1] Invalid name_offset:1610612736 [ 2944.480424][ T8011] BPF:[1] Invalid name_offset:100663296 09:59:04 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x4, 0x4, 0x1004788, 0x8035, 0x0, 0x100000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x24}, @local}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 2944.555063][ T8014] BPF:[1] FUNC_PROTO (anon) 09:59:04 executing program 5: poll(0x0, 0x0, 0x800000000004b) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x58d, 0x0, 0x0, 0x800e004e5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f00000003c0)=[{r1}, {}, {}], 0x3, 0xca) shutdown(r0, 0x0) [ 2944.582462][ T8020] BPF:[1] Invalid name_offset:1610612736 [ 2944.621882][ T8014] BPF:return=0 args=( 09:59:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x7000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2944.650805][ T8014] BPF:0 (anon) 09:59:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2}, {0x0, [0x2e, 0x5f, 0x5f, 0x28, 0x61, 0x2e, 0x0, 0x5f]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0xd) [ 2944.676957][ T8014] BPF:, 3072 (invalid-name-offset) 09:59:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x68000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2944.708055][ T8014] BPF:) [ 2944.725087][ T8027] BPF:[1] Invalid name_offset:117440512 [ 2944.725146][ T8014] BPF: 09:59:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) shutdown(0xffffffffffffffff, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00516) [ 2944.769491][ T8014] BPF:Invalid arg#1 [ 2944.789352][ T8036] BPF:[1] Invalid name_offset:117440512 [ 2944.802320][ T8014] BPF: [ 2944.802320][ T8014] 09:59:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) accept$alg(r2, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0xc080661a, &(0x7f00000002c0)={{0x3, 0x0, @identifier="4b93142e4142df748612985af054cfce"}}) r4 = socket$alg(0x26, 0x5, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f0000000200)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) bind$alg(r4, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) accept$alg(r4, 0x0, 0x0) getsockname(r4, &(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000000)=0x80) accept$alg(r6, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x153) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[], &(0x7f0000000700)=""/220, 0x0, 0xdc, 0x8}, 0x20) 09:59:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x8000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2944.823967][ T8037] BPF:[1] Invalid name_offset:1744830464 [ 2944.846117][ T8039] BPF:[1] Invalid name_offset:1744830464 [ 2944.853080][ T8041] BPF:[1] FUNC_PROTO (anon) [ 2944.866900][ T8041] BPF:return=0 args=( [ 2944.900239][ T8041] BPF:0 (anon) [ 2944.916625][ T8041] BPF:, 3072 (invalid-name-offset) 09:59:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x6c000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2944.949282][ T8041] BPF:) [ 2944.971468][ T8041] BPF: [ 2944.974831][ T8047] BPF:hdr_len not found [ 2944.978167][ T8049] BPF:[1] Invalid name_offset:134217728 [ 2944.984802][ T8041] BPF:Invalid arg#1 [ 2945.001894][ T8050] BPF:hdr_len not found [ 2945.012209][ T8041] BPF: [ 2945.012209][ T8041] [ 2945.029713][ T8053] BPF:[1] Invalid name_offset:134217728 [ 2945.039601][ T8054] BPF:[1] Invalid name_offset:1811939328 09:59:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0xa000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:59:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x6628, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000480)={r3}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={r3, 0xffffffff}, 0x8) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2945.070090][ T8055] BPF:[1] Invalid name_offset:1811939328 09:59:05 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0xd00}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:59:05 executing program 5: shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) getsockname(r0, 0x0, &(0x7f00000000c0)) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e007b9) 09:59:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x74000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2945.216547][ T8065] BPF:[1] Invalid name_offset:167772160 [ 2945.256949][ T8064] BPF:[1] FUNC_PROTO (anon) [ 2945.263508][ T8066] BPF:[1] Invalid name_offset:167772160 [ 2945.290308][ T8064] BPF:return=0 args=( [ 2945.300136][ T8064] BPF:0 (anon) 09:59:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x10000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2945.305584][ T8072] BPF:[1] Invalid name_offset:1946157056 [ 2945.320664][ T8064] BPF:, 3328 (invalid-name-offset) [ 2945.331703][ T8064] BPF:) [ 2945.337986][ T8073] BPF:[1] Invalid name_offset:1946157056 [ 2945.339139][ T8064] BPF: [ 2945.348358][ T8064] BPF:Invalid arg#1 [ 2945.375431][ T8064] BPF: [ 2945.375431][ T8064] 09:59:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x7a000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2945.401255][ T8076] BPF:[1] FUNC_PROTO (anon) [ 2945.420244][ T8077] BPF:[1] Invalid name_offset:268435456 [ 2945.427584][ T8076] BPF:return=0 args=( [ 2945.442023][ T8078] BPF:[1] Invalid name_offset:268435456 [ 2945.461042][ T8076] BPF:0 (anon) [ 2945.464552][ T8076] BPF:, 3328 (invalid-name-offset) [ 2945.481321][ T8076] BPF:) [ 2945.494520][ T8076] BPF: [ 2945.497404][ T8076] BPF:Invalid arg#1 [ 2945.505273][ T8081] BPF:[1] Invalid name_offset:2046820352 09:59:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x12000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2945.509542][ T8076] BPF: [ 2945.509542][ T8076] [ 2945.534395][ T8082] BPF:[1] Invalid name_offset:2046820352 [ 2945.570868][ T8085] BPF:[1] Invalid name_offset:301989888 [ 2945.606820][ T8087] BPF:[1] Invalid name_offset:301989888 09:59:05 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0xf00}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) 09:59:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0xdb000000, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) 09:59:05 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0x42, 0x0, &(0x7f0000000040)) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e0038d) 09:59:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x20000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) [ 2945.749204][ T8093] BPF:[1] Invalid name_offset:536870912 [ 2945.763638][ T8097] BPF:[1] FUNC_PROTO (anon) [ 2945.771201][ T8096] BPF:[1] Invalid name_offset:3674210304 [ 2945.781842][ T8097] BPF:return=0 args=( [ 2945.790526][ T8101] BPF:[1] Invalid name_offset:3674210304 [ 2945.795255][ T8097] BPF:0 (anon) [ 2945.807337][ T8097] BPF:, 3840 (invalid-name-offset) [ 2945.812260][ T8100] BPF:[1] Invalid name_offset:536870912 [ 2945.814314][ T8097] BPF:) [ 2945.826511][ T8097] BPF: [ 2945.829598][ T8097] BPF:Invalid arg#1 [ 2945.836405][ T8097] BPF: [ 2945.836405][ T8097] 09:59:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0xffffff00, 0x2, 0x0, 0xf}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/220, 0x27, 0xdc, 0x8}, 0x20) [ 2945.854753][ T8103] BPF:[1] FUNC_PROTO (anon) [ 2945.861599][ T8103] BPF:return=0 args=( [ 2945.869293][ T8103] BPF:0 (anon) [ 2945.874363][ T8103] BPF:, 3840 (invalid-name-offset) [ 2945.879984][ T8103] BPF:) [ 2945.885748][ T8103] BPF: [ 2945.888973][ T8103] BPF:Invalid arg#1 [ 2945.898009][ T8103] BPF: [ 2945.898009][ T8103] 09:59:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x3f000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000700)=""/220, 0x2a, 0xdc, 0x8}, 0x20) 09:59:05 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0x1600}]}]}}, &(0x7f0000000700)=""/219, 0x36, 0xdb, 0x8}, 0x20) [ 2946.022996][ T8108] BPF:[1] Invalid name_offset:4294967040 [ 2946.051422][ T8112] BPF:[1] Invalid name_offset:1056964608 [ 2946.059078][ T8113] BPF:[1] Invalid name_offset:4294967040 [ 2946.065027][ T8111] BPF:[1] FUNC_PROTO (anon) [ 2946.072336][ T8111] BPF:return=0 args=( [ 2946.076605][ T8114] BPF:[1] Invalid name_offset:1056964608 [ 2946.080065][ T8111] BPF:0 (anon) [ 2946.083136][ T8116] kasan: CONFIG_KASAN_INLINE enabled [ 2946.090257][ T8111] BPF:, 5632 (invalid-name-offset) [ 2946.091447][ T8116] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 2946.091471][ T8116] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 2946.091486][ T8116] CPU: 0 PID: 8116 Comm: syz-executor.5 Not tainted 5.4.0-rc3+ #0 [ 2946.091494][ T8116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2946.091514][ T8116] RIP: 0010:ip_sublist_rcv+0x5c0/0x950 [ 2946.091541][ T8116] Code: 0f 85 34 01 00 00 e8 7f 09 5f fb 48 8b 85 00 ff ff ff 48 8d b8 e8 0e 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 69 03 00 00 48 8b 85 00 ff ff ff 4c 8b a0 e8 0e [ 2946.097822][ T8111] BPF:) [ 2946.104949][ T8116] RSP: 0018:ffff888070a2f3c8 EFLAGS: 00010206 [ 2946.104963][ T8116] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90010dd0000 [ 2946.104972][ T8116] RDX: 00000000000001dd RSI: ffffffff86141221 RDI: 0000000000000ee8 [ 2946.104979][ T8116] RBP: ffff888070a2f4f0 R08: ffff888069248080 R09: ffffed1015d06b75 [ 2946.104987][ T8116] R10: ffffed1015d06b74 R11: ffff8880ae835ba3 R12: 0000000000000001 [ 2946.104994][ T8116] R13: ffff88806b050000 R14: ffff888070a2f558 R15: ffff888070a2f4c8 [ 2946.105004][ T8116] FS: 00007f57d2443700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 2946.105011][ T8116] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2946.105031][ T8116] CR2: 00007f57d2442db8 CR3: 0000000090fc4000 CR4: 00000000001406f0 [ 2946.117862][ T8111] BPF: [ 2946.119753][ T8116] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2946.119761][ T8116] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2946.119766][ T8116] Call Trace: [ 2946.119791][ T8116] ? ip_rcv_finish+0x2f0/0x2f0 [ 2946.119806][ T8116] ? kfree_skbmem+0xca/0x150 [ 2946.119825][ T8116] ? kfree_skb+0x10e/0x3c0 [ 2946.130064][ T8111] BPF:Invalid arg#1 [ 2946.135351][ T8116] ? ip_rcv_core.isra.0+0x878/0xc80 [ 2946.135367][ T8116] ip_list_rcv+0x370/0x4ac [ 2946.135382][ T8116] ? ip_rcv+0x3f0/0x3f0 [ 2946.135399][ T8116] ? ip_rcv+0x3f0/0x3f0 [ 2946.155276][ T8111] BPF: [ 2946.155276][ T8111] [ 2946.157928][ T8116] __netif_receive_skb_list_core+0x1a2/0x9d0 [ 2946.157947][ T8116] ? ktime_get_with_offset+0x13a/0x360 [ 2946.157964][ T8116] ? ktime_get_with_offset+0x13a/0x360 [ 2946.166612][ T8117] BPF:[1] FUNC_PROTO (anon) [ 2946.171996][ T8116] ? process_backlog+0x750/0x750 [ 2946.172012][ T8116] ? lock_acquire+0x190/0x410 [ 2946.172026][ T8116] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2946.172039][ T8116] ? __kasan_check_read+0x11/0x20 [ 2946.172060][ T8116] netif_receive_skb_list_internal+0x7eb/0xe60 [ 2946.180136][ T8117] BPF:return=0 args=( [ 2946.188005][ T8116] ? __netif_receive_skb_list_core+0x9d0/0x9d0 [ 2946.188022][ T8116] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2946.188040][ T8116] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2946.188052][ T8116] ? eth_type_trans+0x3a5/0x760 [ 2946.188071][ T8116] gro_normal_list.part.0+0x1e/0xb0 [ 2946.196680][ T8117] BPF:0 (anon) [ 2946.204509][ T8116] gro_normal_one+0x184/0x1d0 [ 2946.204525][ T8116] napi_gro_frags+0x915/0xd00 [ 2946.204541][ T8116] tun_get_user+0x2e98/0x3fa0 [ 2946.204559][ T8116] ? __kasan_check_read+0x11/0x20 [ 2946.213985][ T8117] BPF:, 5632 (invalid-name-offset) [ 2946.220042][ T8116] ? tun_build_skb.isra.0+0x1390/0x1390 [ 2946.220063][ T8116] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2946.220080][ T8116] ? __kasan_check_read+0x11/0x20 [ 2946.228148][ T8117] BPF:) [ 2946.230800][ T8116] tun_chr_write_iter+0xbd/0x156 [ 2946.230815][ T8116] do_iter_readv_writev+0x5f8/0x8f0 [ 2946.230834][ T8116] ? no_seek_end_llseek_size+0x70/0x70 [ 2946.239066][ T8117] BPF: [ 2946.246874][ T8116] ? apparmor_file_permission+0x25/0x30 [ 2946.246892][ T8116] ? rw_verify_area+0x126/0x360 [ 2946.246904][ T8116] do_iter_write+0x184/0x610 [ 2946.246917][ T8116] ? dup_iter+0x260/0x260 [ 2946.246934][ T8116] vfs_writev+0x1b3/0x2f0 [ 2946.250289][ T8117] BPF:Invalid arg#1 [ 2946.254971][ T8116] ? vfs_iter_write+0xb0/0xb0 [ 2946.254983][ T8116] ? __kasan_check_read+0x11/0x20 [ 2946.255003][ T8116] ? ksys_dup3+0x3e0/0x3e0 [ 2946.255014][ T8116] ? __kasan_check_read+0x11/0x20 [ 2946.255030][ T8116] ? __fget_light+0x1a9/0x230 [ 2946.259683][ T8117] BPF: [ 2946.259683][ T8117] [ 2946.264003][ T8116] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2946.264017][ T8116] do_writev+0x15b/0x330 [ 2946.264029][ T8116] ? vfs_writev+0x2f0/0x2f0 [ 2946.264043][ T8116] ? do_syscall_64+0x26/0x760 [ 2946.264064][ T8116] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2946.301104][ T3900] kobject: 'loop2' (00000000947df05c): kobject_uevent_env [ 2946.302061][ T8116] ? do_syscall_64+0x26/0x760 [ 2946.307528][ T3900] kobject: 'loop2' (00000000947df05c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2946.312085][ T8116] __x64_sys_writev+0x75/0xb0 [ 2946.312099][ T8116] do_syscall_64+0xfa/0x760 [ 2946.312122][ T8116] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2946.344739][ T3900] kobject: 'loop1' (00000000221f0cd0): kobject_uevent_env [ 2946.349176][ T8116] RIP: 0033:0x459df1 [ 2946.349190][ T8116] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 2946.349203][ T8116] RSP: 002b:00007f57d2442ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 2946.369136][ T3900] kobject: 'loop1' (00000000221f0cd0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2946.371762][ T8116] RAX: ffffffffffffffda RBX: 000000000000002a RCX: 0000000000459df1 [ 2946.371770][ T8116] RDX: 0000000000000001 RSI: 00007f57d2442c00 RDI: 00000000000000f0 [ 2946.371777][ T8116] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 2946.371786][ T8116] R10: 00007f57d24439d0 R11: 0000000000000293 R12: 00007f57d24436d4 [ 2946.371792][ T8116] R13: 00000000004c9352 R14: 00000000004e0a60 R15: 00000000ffffffff [ 2946.371803][ T8116] Modules linked in: [ 2946.371864][ T8116] ---[ end trace e0a8f5f5e037e28f ]--- [ 2946.413833][ T3900] kobject: 'loop3' (0000000085a541dd): kobject_uevent_env [ 2946.416342][ T8116] RIP: 0010:ip_sublist_rcv+0x5c0/0x950 [ 2946.416359][ T8116] Code: 0f 85 34 01 00 00 e8 7f 09 5f fb 48 8b 85 00 ff ff ff 48 8d b8 e8 0e 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 69 03 00 00 48 8b 85 00 ff ff ff 4c 8b a0 e8 0e [ 2946.421325][ T3900] kobject: 'loop3' (0000000085a541dd): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2946.424510][ T8116] RSP: 0018:ffff888070a2f3c8 EFLAGS: 00010206 [ 2946.444547][ T3900] kobject: 'loop4' (000000000a28d8c1): kobject_uevent_env [ 2946.448312][ T8116] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90010dd0000 [ 2946.470844][ T3900] kobject: 'loop4' (000000000a28d8c1): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2946.475695][ T8116] RDX: 00000000000001dd RSI: ffffffff86141221 RDI: 0000000000000ee8 [ 2946.475703][ T8116] RBP: ffff888070a2f4f0 R08: ffff888069248080 R09: ffffed1015d06b75 [ 2946.475711][ T8116] R10: ffffed1015d06b74 R11: ffff8880ae835ba3 R12: 0000000000000001 [ 2946.475719][ T8116] R13: ffff88806b050000 R14: ffff888070a2f558 R15: ffff888070a2f4c8 [ 2946.475735][ T8116] FS: 00007f57d2443700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 2946.659319][ T3900] kobject: 'loop0' (00000000a49745be): kobject_uevent_env [ 2946.663362][ T8116] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2946.663369][ T8116] CR2: 00007f57d2442db8 CR3: 0000000090fc4000 CR4: 00000000001406f0 [ 2946.663379][ T8116] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2946.663386][ T8116] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2946.663394][ T8116] Kernel panic - not syncing: Fatal exception in interrupt [ 2946.670357][ T8116] Kernel Offset: disabled [ 2946.821413][ T8116] Rebooting in 86400 seconds..